April
21st,
2017
This is a the second part of a VERY in depth post on exploiting binaries using Free-After-Use vulnerabilities. This post was featured in Vector35's newsletter and features the use of Binary Ninja, a powerful disassembler.
April
20th,
2017
This is the first part of a VERY in depth series on exploiting binaries using Buffer Overflow and Free-After-Use vulnerabilities. This post was featured in Vector35's newsletter and features the use of Binary Ninja, a powerful reverse engineering tool for disassembling binaries.
November
14th,
2016
An in depth introduction to writing a reflective DLL injector from scratch