Low-level adventures
  • Home
  • About
  • Publications
  • Buzzwords
  • AIScholar
  • Buy me a coffee
  • Follow
    Subscribe to Low-level adventures
    Get the latest posts delivered right to your inbox
    Great! Check your inbox and click the link to confirm your subscription
    Please enter a valid email address!
  • Log in Sign up
The State of Go Fuzzing - Did we already reach the peak?
Fuzzing

The State of Go Fuzzing - Did we already reach the peak?

Learning Linux kernel exploitation - Part 2 - CVE-2022-0847
Exploitation

Learning Linux kernel exploitation - Part 2 - CVE-2022-0847

Learning Linux kernel exploitation - Part 1 - Laying the groundwork
Exploitation

Learning Linux kernel exploitation - Part 1 - Laying the groundwork

Overview of GLIBC heap exploitation techniques

Overview of GLIBC heap exploitation techniques

13 February 2022
MISC study notes about ARM AArch64 Assembly and the ARM Trusted Execution Environment (TEE)
General

MISC study notes about ARM AArch64 Assembly and the ARM Trusted Execution Environment (TEE)

12 February 2022
LinkSys EA6100 AC1200 - Part 2 - A serial connection FTW!
Hardware

LinkSys EA6100 AC1200 - Part 2 - A serial connection FTW!

5 November 2021
The devil entered the stage!
RE

The devil entered the stage!

3 February 2021
LinkSys EA6100 AC1200 - Part 1 - PCB reversing
Hardware

LinkSys EA6100 AC1200 - Part 1 - PCB reversing

11 January 2021
Breaking the D-Link DIR3060 Firmware Encryption - Static analysis of the decryption routine - Part 2.2
Hardware

Breaking the D-Link DIR3060 Firmware Encryption - Static analysis of the decryption routine - Part 2.2

15 July 2020
Breaking the D-Link DIR3060 Firmware Encryption - Static analysis of the decryption routine - Part 2.1
Hardware

Breaking the D-Link DIR3060 Firmware Encryption - Static analysis of the decryption routine - Part 2.1

14 July 2020
Breaking the D-Link DIR3060 Firmware Encryption - Recon - Part 1
Hardware

Breaking the D-Link DIR3060 Firmware Encryption - Recon - Part 1

13 July 2020
What's a bitbang?
RE

What's a bitbang?

Note: This is a re-upload of an old write-up. This is another write-up from an interesting little challenge. The original forum post about it can
By 0x434b 12 Jul 2020
Welcome to the Poly Bomb 💣
RE

Welcome to the Poly Bomb 💣

Note: Re-write/Re-upload due to dead links This write up are my thoughts and steps to statically analyze a given unknown binary. I want to
By 0x434b 10 Jul 2020
Reversing and Exploiting Dr. von Noizemans Nuclear Bomb
RE

Reversing and Exploiting Dr. von Noizemans Nuclear Bomb

Note: Re-upload due to dead links :) Yo! Life kept me more than busy, but now I've got a little more time on my
By 0x434b 10 Jul 2020
Exploit Mitigation Techniques - Part 2 -  Stack Canaries
Exploitation

Exploit Mitigation Techniques - Part 2 - Stack Canaries

Preface Hey there! After quite some time the second part will be finally published :) ! Sorry for the delay, real life can be overwhelming.. Last time
By 0x434b 4 May 2020

Newsletter

Stay up to date! Get all the latest & greatest posts delivered straight to your inbox
Great! Check your inbox and click the link to confirm your subscription
Please enter a valid email address!

Tag Cloud

RE (8) Exploitation (7) Hardware (6) Fuzzing (2) General (2)
Copyright 2025, Low-level adventures. All Rights Reserved. Design with by @GodoFredoNinja
Low-level adventures

  • Home
  • About
  • Publications
  • Buzzwords
  • AIScholar
  • Buy me a coffee

Log in Sign up

Follow
Search suggestions
    github