LIGHT
DARK
Home
Archive
About
My Calendar
Projects
CV
RSS
Archive.
2024
Buffer Overflow Part 2
Buffer Overflow Part 1
SEC660 / GXPN Review
Structured Exception Handler (SEH) Part 3
Structured Exception Handler (SEH) Part 2
Structured Exception Handler (SEH) Part 1
The Stack and Windows x86 Calling Conventions Part 3
2023
The Stack and Windows x86 Calling Conventions Part 2
The Stack and Windows x86 Calling Conventions Part 1
MIPS System Calls
Creating Custom Auditd Rules for Username-Path Dependent Files
Process Creation Functions Part 2
Process Creation Functions Part 1
File Content Modification Detection with Auditd
MAPI over HTTP
SUID Programs Part 2
Exploring system() in SUID Programs
2022
SUID Programs Part 1
PHP Type Juggling Vulnerability
Server Side Template Injection (SSTI)
2021
Security Assertion Markup Language
Spoofing Prevention Mechanism
Anti-Malware Scan Interface (AMSI)
2020
Insecure Deserialization
XPath Injection
ModSecurity Review
PWN Adventure 3
XML External Entity Injection (XXE)
2019
Injection attacks on System() Function
Admin Diagnostics Write-up
The Fundamental Cause of Injection Attacks
SD3
Approaches to Input Handling
Writing Shellcodes Notes