-
Handle Pwn Libc and Host a Pwn
This blog introduces tools to deal with libc problems in pwn and to host pwn challenges. Pwn Libc PartThe libc version matter... -
ARM & MIPS PWN Intro
This paragraph is to pwn ARM and MIPS binaries, with some examples. Environment SetupBasically binaries are executed by QEMU... -
Heap Exploit Intro
Succinct Challenge-Oriented heap exploit introduction. Here we talk about the heap on Linux. ImplementationYou can visit GNU ... -
Linux Kernel Building & Exploit Preparation
Linux Kernel BuildTo learn kernel, we should know how to compile it and how it works. Source code can be found online and all... -
About Privilege Escalation
Recently I get some time to collect materials about privilege escalation, provide you with useful tools and some basic knowle... -
About Pentest Persistence
Persistence is to maintain your privilege after breaking into a system. WindowsYou can learn persistence methodologies/... -
Some Assembly Intro
CISC and RISCThere are two main types of computer architectures that will be covered in this project: Complex Instruction Set... -
Cross Compile Toolchains
Just now I found the site toolchains.bootlin.com to download suitable prebuilt toolchain, it provides detailed GCC/GDB... -
Firmadyne and FirmAE
Since IoT researches are facing analysing problems due to the discrepancy in the real and virtual environment, the full-syste... -
Build Mirai Botnet and Try It
Mirai is a self-spreading botnet virus. The Mirai botnet code contaminates inadequately secured web gadgets by utilizing teln...