Configuring sensors to detect physical intrusion.
Common security issues with integer variables.
Reverse shells in x64 assembly.
Exploiting PIE enabled executables.
Using the EvilCrowRF to transmit Sub-Ghz signals.
Creating custom wordlists for use in password brute force attacks.
Interacting with GPIO’s using Python.
Executing the execve syscall on x64 Linux using Shellcode.
Completing BLE CTF.
Performing a Return-to-libc attack on ARM64 systems.
Calling mprotect on x64 Linux.
Exploiting memory corruption vulnerabilities on MIPS32 systems.