Reverse shells in x64 assembly.
Position Independent Executables
Exploiting PIE enabled executables.
EvilCrowRF V2
Using the EvilCrowRF to transmit Sub-Ghz signals.
Custom Wordlists
Creating custom wordlists for use in password brute force attacks.
GPIO
Interacting with GPIO’s using Python.
Execve Shellcode
Executing the execve syscall on x64 Linux using Shellcode.
Bluetooth Low Energy
Completing BLE CTF.
ARM64 ROP Chaining
Performing a Return-to-libc attack on ARM64 systems.
x64 MPROTECT ROP
Calling mprotect on x64 Linux.
MIPS32 Buffer Overflows
Exploiting memory corruption vulnerabilities on MIPS32 systems.
Command Injection
Exploiting command injection vulnerabilities.
Serial Peripheral Interfaces
Interacting with SPI to extract the contents of a ROM.