Strategies for Binary Exploitation Part 2 (Use-After-Free)

This is a the second part of a VERY in depth post on exploiting binaries using Free-After-Use vulnerabilities. This post was featured in Vector35's newsletter and features the use of Binary Ninja, a powerful disassembler.

Strategies for Binary Exploitation Part 1 (Memory Corruption)

This is the first part of a VERY in depth series on exploiting binaries using Buffer Overflow and Free-After-Use vulnerabilities. This post was featured in Vector35's newsletter and features the use of Binary Ninja, a powerful reverse engineering tool for disassembling binaries.

Introduction to Reflective DLL Injection

An in depth introduction to writing a reflective DLL injector from scratch