Reverse shells in x64 assembly.
Exploiting PIE enabled executables.
Using the EvilCrowRF to transmit Sub-Ghz signals.
Creating custom wordlists for use in password brute force attacks.
Interacting with GPIO’s using Python.
Executing the execve syscall on x64 Linux using Shellcode.
Completing BLE CTF.
Performing a Return-to-libc attack on ARM64 systems.
Calling mprotect on x64 Linux.
Exploiting memory corruption vulnerabilities on MIPS32 systems.
Exploiting command injection vulnerabilities.
Interacting with SPI to extract the contents of a ROM.