-
One Year to I/O Ring: What Changed? [ru]
#kernelexploitation #windows #translation
-
I/O Rings – When One I/O Operation is Not Enough [ru]
#kernelexploitation #windows #translation
-
Windows Threads Priorities [eng]
#windows #lab
-
Windows Kernel Exploitation 0x06 | Uninitialized Heap Variable [eng]
#kernelexploitation #windows #lab
-
Windows Kernel Exploitation 0x05 | Uninitialized Stack Variable [eng]
#kernelexploitation #windows #lab
-
Windows Kernel Exploitation 0x04 | NULL Pointer Dereference [eng]
#kernelexploitation #windows #lab
-
Windows Kernel Exploitation 0x03 | Pool Overflow [ru]
#kernelexploitation #windows #lab
-
pwnable.kr [ru]
#linux #pwn #lab
-
Windows Kernel Exploitation 0x02 | Arbitrary Write [ru]
#kernelexploitation #windows #lab
-
Windows Kernel Exploitation 0x01 | Buffer Overflow [ru]
#kernelexploitation #windows #lab
-
CTFZone GrandDad's Magic task write-up [eng]
#ctf #reverseengineering
-
Pseudo-Registers and Expressions in WinDbg [eng]
#windbg
-
WinDBG commands [eng]
#windbg
-
Немного о прерываниях, их обработке и есесна ядре [ru]
#windows #internals
-
Абуз токенов для повышения привилегий [ru]
#windows #internals #lab
-
Скрываемся в списке процессов в ядре [ru]
#windows #internals #lab
-
Ползаем по стеку и куче в ядре [ru]
#windows #internals
-
Ищем EPROCESS и ETHREAD, отнимаем байтики [ru]
#windows #internals
-
Reverse Engineering Roadmap
#reverseengineering