Low-level adventures
  • Home
  • About
  • Publications
  • Buzzwords
  • Fuzzing-Papers
  • Buy me a coffee
  • Follow
    Subscribe to Low-level adventures
    Get the latest posts delivered right to your inbox
    Great! Check your inbox and click the link to confirm your subscription
    Please enter a valid email address!
  • Log in Sign up
Learning Linux kernel exploitation - Part 2 - CVE-2022-0847
Exploitation

Learning Linux kernel exploitation - Part 2 - CVE-2022-0847

Learning Linux kernel exploitation - Part 1 - Laying the groundwork
Exploitation

Learning Linux kernel exploitation - Part 1 - Laying the groundwork

Overview of GLIBC heap exploitation techniques

Overview of GLIBC heap exploitation techniques

MISC study notes about ARM AArch64 Assembly and the ARM Trusted Execution Environment (TEE)
General

MISC study notes about ARM AArch64 Assembly and the ARM Trusted Execution Environment (TEE)

12 February 2022
LinkSys EA6100 AC1200 - Part 2 - A serial connection FTW!
Hardware

LinkSys EA6100 AC1200 - Part 2 - A serial connection FTW!

5 November 2021
The devil entered the stage!
RE

The devil entered the stage!

3 February 2021
LinkSys EA6100 AC1200 - Part 1 - PCB reversing
Hardware

LinkSys EA6100 AC1200 - Part 1 - PCB reversing

11 January 2021
Breaking the D-Link DIR3060 Firmware Encryption - Static analysis of the decryption routine - Part 2.2
Hardware

Breaking the D-Link DIR3060 Firmware Encryption - Static analysis of the decryption routine - Part 2.2

15 July 2020
Breaking the D-Link DIR3060 Firmware Encryption - Static analysis of the decryption routine - Part 2.1
Hardware

Breaking the D-Link DIR3060 Firmware Encryption - Static analysis of the decryption routine - Part 2.1

14 July 2020
Breaking the D-Link DIR3060 Firmware Encryption - Recon - Part 1
Hardware

Breaking the D-Link DIR3060 Firmware Encryption - Recon - Part 1

13 July 2020
What's a bitbang?
RE

What's a bitbang?

12 July 2020
Welcome to the Poly Bomb 💣
RE

Welcome to the Poly Bomb 💣

Note: Re-write/Re-upload due to dead links This write up are my thoughts and steps to statically analyze a given unknown binary. I want to
By 0x434b 10 Jul 2020
Reversing and Exploiting Dr. von Noizemans Nuclear Bomb
RE

Reversing and Exploiting Dr. von Noizemans Nuclear Bomb

Note: Re-upload due to dead links :) Yo! Life kept me more than busy, but now I've got a little more time on my hands. I
By 0x434b 10 Jul 2020
Exploit Mitigation Techniques - Part 2 -  Stack Canaries
Exploitation

Exploit Mitigation Techniques - Part 2 - Stack Canaries

Preface Hey there! After quite some time the second part will be finally published :) ! Sorry for the delay, real life can be overwhelming.. Last time
By 0x434b 4 May 2020
Exploit Mitigation Techniques - Part 3 - Address Space Layout Randomization (ASLR)
Exploitation

Exploit Mitigation Techniques - Part 3 - Address Space Layout Randomization (ASLR)

Preface Hey there! I'm finally ready to present you the third installment of the series exploit mitigation techniques. The last two times we talked about
By 0x434b 4 May 2020

Newsletter

Stay up to date! Get all the latest & greatest posts delivered straight to your inbox
Great! Check your inbox and click the link to confirm your subscription
Please enter a valid email address!

Tag Cloud

RE (8) Exploitation (7) Hardware (6) General (2) Fuzzing (1)
Copyright 2023, Low-level adventures. All Rights Reserved. Design with by @GodoFredoNinja
Low-level adventures

  • Home
  • About
  • Publications
  • Buzzwords
  • Fuzzing-Papers
  • Buy me a coffee

Log in Sign up

Follow
Search suggestions
    github