Linux x64 Reverse Shellcode

Reverse shells in x64 assembly.

Position Independent Executables

Exploiting PIE enabled executables.

EvilCrowRF V2

Using the EvilCrowRF to transmit Sub-Ghz signals.

Custom Wordlists

Creating custom wordlists for use in password brute force attacks.

GPIO

Interacting with GPIO’s using Python.

Execve Shellcode

Executing the execve syscall on x64 Linux using Shellcode.

Bluetooth Low Energy

Completing BLE CTF.

ARM64 ROP Chaining

Performing a Return-to-libc attack on ARM64 systems.

x64 MPROTECT ROP

Calling mprotect on x64 Linux.

MIPS32 Buffer Overflows

Exploiting memory corruption vulnerabilities on MIPS32 systems.

Command Injection

Exploiting command injection vulnerabilities.

Serial Peripheral Interfaces

Interacting with SPI to extract the contents of a ROM.