Executing the execve syscall on x64 Linux using Shellcode.
Completing BLE CTF.
Performing a Return-to-libc attack on ARM64 systems.
Calling mprotect on x64 Linux.
Exploiting memory corruption vulnerabilities on MIPS32 systems.
Exploiting command injection vulnerabilities.
Interacting with SPI to extract the contents of a ROM.
Intercepting signals from a HDMI monitor.
Interfacing with UART to gain command line access on a embedded device.
Falsifying Global Positioning System signals.
Performing VLAN hopping attacks.
Exploiting VRRP & HSRP.