Posts
-
Are We Helping?
-
Cognitive Artifacts: Complementary & Competitive
-
How I Interpret the Times in Which We Live
-
Why Managing Nuance Matters for Red Teams
-
Operational Mental Models
-
Operators, EDR Sensors, and OODA Loops
-
Recovering ProtoBuf Descriptors
-
Covert Data Persistence with Registry Keys
-
Code Signing on a Budget
-
WPA2-PSK PMKID Attack with Kali and Alfa AC1200
-
CVE-2019-9730: LPE in Synaptics Sound Driver
-
CVE-2019-8372: LPE in LG Kernel Driver
-
Understanding the Current Era of Binary Exploitation
-
How-To Assess System Images: An Overview
-
Recovering HEVD IOCTLs with Symbolic Execution
-
CVE-2017-11907 WPAD.dat Generator for Responder
-
High-Level Approaches for Finding Vulnerabilities
-
RCE and PCI Data Exfiltration in Oracle OPERA
-
java.lang.Runtime.exec() Payload Workarounds
-
A Diagram for Sabotaging Cryptosystems
-
PoliCTF 2015 Android Reversing Writeup