0xor0ne/awesome-list

GitHub: 0xor0ne/awesome-list

一个收录了自2011年以来高质量网络安全博客、报告与论文的精选知识库。

Stars: 3280 | Forks: 353

# 精选网络安全列表 我个人收集的专注于网络安全的精选博客文章、报告和论文。 想要更深入地了解网络安全相关工具,请查看专门的 **[网络安全工具](topics/tools_and_repos.md)** 列表。 ## 目录 - [2025](#2025) - [2024](#2024) - [2023](#2023) - [2022](#2022) - [2021](#2021) - [2020](#2020) - [2019](#2019) - [2018](#2018) - [2017](#2017) - [2016](#2016) - [2014](#2014) - [2011](#2011) - [杂项](#misc) - [其他列表](#other-lists) ## 2025 - ["A File Format Uncracked for 20 Years"][1202] - ["A First Glimpse of the Starlink User Ternimal"][1084] - ["A Fuzzy Escape - A tale of vulnerability research on hypervisors"][1151] - ["A modern tale of blinkenlights"][1200] - ["A Quick Dive Into The Linux Kernel Page Allocator"][1098] - ["A Series of io_uring pbuf Vulnerabilities"][1083] - ["A Tour of eBPF in the Linux Kernel: Observability, Security and Networking"][1181] - ["Accidentally Uncovering a Seven Years Old Vulnerability in the Linux Kernel"][1021] - ["All You Need Is MCP - LLMs Solving a DEF CON CTF Finals Challenge"][1142] - ["Analysing a 1-day Vulnerability in the Linux Kernel's TLS Subsystem"][1174] - ["Analyzing IOS Kernel Panic Logs"][1037] - ["Android: Scudo"][1070] - ["APPROTECT Bypass on NRF52832"][1139] - ["APT28 Operation Phantom Net Voxel"][1171] - ["Attacking GenAI applications and LLMs – Sometimes all it takes is to ask nicely!"][1132] - ["Attention, High Voltage: Exploring the Attack Surface of the Rockwell Automation PowerMonitor 1000"][1106] - ["Being Overlord on the Steam Deck with 1 Byte"][1044] - "BPFDoor" - ["Part 1 - The Past"][1101] - ["Part 2 - The Present"][1102] - ["Beating xloader at Speed: Generative AI as a Force Multiplier for Reverse Engineering"][1189] - ["Best practices for key derivation"][1023] - ["Binder Fuzzing"][1146] - ["Blasting Past iOS 18"][1038] - ["Booting into Breaches Hunting Windows SecureBoot's Remote Attack Surfaces"][1138] - ["Bootloader to Iris: A Security Teardown of a Hardware Wallet"][1199] - ["Breaking Disassembly — Abusing symbol resolution in Linux programs to obfuscate library calls"][1125] - ["Breaking Into a Brother (MFC-J1010DW): Three Security Flaws in a Seemingly Innocent Printer"][1196] - ["Breaking the Sound Barrier Part I: Fuzzing CoreAudio with Mach Messages"][1039] - ["Broken Trust: Fixed Supermicro BMC Bug Gains a New Life in Two New Vulnerabilities"][1179] - ["Buried in the Log. Exploiting a 20 years old NTFS Vulnerability"][1124] - ["Bypassing disk encryption on systems with automatic TPM2 unlock"][1018] - ["Bypassing MTE with CVE-2025-0072"][1105] - ["Case Study: Analyzing macOS IONVMeFamily Driver Denial of Service Issue"][1040] - ["Case Study: IOMobileFramebuffer NULL Pointer Dereference"][1041] - ["Challenges and Pitfalls while Emulating Six Current Icelandic Household Routers"][1107] - ["CimFS: Crashing in memory, Finding SYSTEM (Kernel Edition)"][1061] - ["Control Flow Hijacking in the Linux Kernel"][1114] - ["Control Flow Hijacking via Data Pointers"][1085] - ["corCTF 2025 - corphone"][1168] - ["Cross Cache Attack CheetSheet"][1006] - ["CVE-2023-52927 - Turning a Forgotten Syzkaller Report into kCTF Exploit"][1118] - ["CVE-2024-30088 Pwning Windows Kernel @ Pwn2Own Vancouver 2024 (Plus Xbox)"][1149] - ["CVE-2024-53141: an OOB Write Vulnerability in Netfiler Ipset"][1065] - ["CVE-2025-23016 - EXPLOITING THE FASTCGI LIBRARY"][1086] - ["CVE-2025-37752 wo Bytes Of Madness: Pwning The Linux Kernel With A 0x0000 Written 262636 Bytes Out-Of-Bounds"][1076] - ["CVE-2025-38001 Exploiting All Google kernelCTF Instances And Debian 12 With A 0-Day For $82k: An RBTree Family Drama"][1163] - ["CVE-2025-6554: The (rabbit) Hole"][1188] - ["Debugging the Pixel 8 kernel via KGDB"][1123] - ["Defeating String Obfuscation in Obfuscated NodeJS Malware using AST"][1068] - ["Denial of Ruzzing: Rust in the Windows Kernel"][1185] - ["Dirty Pageflags: Revisiting PTE Exploitation in Linux"][1166] - ["Disassembling a binary: linear sweep and recursive traversal"][1019] - ["Dissecting the macOS 'AppleProcessHub' Stealer: Technical Analysis of a Multi-Stage Attack"][1047] - ["Don’t Phish-let Me Down: FIDO Authentication Downgrade"][1155] - ["EL3vated Privileges: Glitching Google WiFi Pro from Root to EL3"][1121] - ["Emulating an iPhone in QEMU"][1051] - ["Endless Exploits: The Saga of a macOS Vulnerability Struck Nine Times"][1052] - ["Exploitation of AIxCC Nginx bugs: Part I"][1035] - ["Exploitation Walkthrough and Techniques - Ivanti Connect Secure RCE (CVE-2025-0282)"][1014] - ["Exploiting CVE-2024-0582 via the Dirty Pagetable Method"][1081] - ["Exploiting CVE-2025-21479 on a Samsung S23"][1184] - ["Exploiting Retbleed in the real world"][1141] - ["Exploiting the Synology TC500 at Pwn2Own Ireland 2024"][1122] - ["Exploiting Zero-Day (CVE-2025–9961) Vulnerability in the TP-Link AX10 Router"][1164] - ["Exploiting Heroes of Might and Magic V"][1119] - ["Exploring Grapheneos Secure Allocator: Hardened Malloc"][1167] - ["Exploring Heap Exploitation Mechanisms: Understanding the House of Force Technique"][1029] - ["Eternal-Tux: Crafting a Linux Kernel KSMBD 0-Click RCE Exploit from N-Days"][1172] - ["Extraction of Synology Encrypted Archives - Pwn2Own Ireland 2024"][1152] - ["False Injections: Tales of Physics, Misconceptions and Weird Machines"][1120] - ["Fast & Faulty - A Use After Free in KGSL Fault Handling"][1182] - ["FiberGateway GR241AG - Full Exploit Chain"][1097] - ["First analysis of Apple's USB Restricted Mode bypass (CVE-2025-24200)"][1058] - ["FLOP: Breaking the Apple M3 CPU via False Load Output Predictions"][1059] - ["Fundamental of Virtual Memory"][1162] - ["From Chrome renderer code exec to kernel with MSG_OOB"][1153] - ["Game Hacking - Valve Anti-Cheat (VAC)"][1074] - ["Gone in 5 Seconds: How WARN_ON Stole 10 Minutes"][1103] - ["Google CTF 2025 Quals Writeup"][1131] - ["Hack The Emulated Planet: Vulnerability Hunting on Planet WGS-804HPT Industrial Switches"][1031] - ["Hacking the XBox 360 Hypervisor"] - [Part 1][1109] - [Part 2][1110] - ["Hacking Sonoff Smart Home IoT Device - Extract, Modify, Boot, Intercept, Clone!"][1129] - ["Hacking the Nokia Beacon 1 Router: UART, Command Injection, and Password Generation with Qiling"][1198] - ["HITCON CTF 2025 -- calc"][1145] - ["How I ruined my vacation by reverse engineering WSC"][1077] - ["How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation"][1090] - ["How Much More Must We Bleed? - Citrix NetScaler Memory Disclosure (CitrixBleed 2 CVE-2025-5777)"][1115] - "Hydroph0bia (CVE-2025-4275)" - ["a trivial SecureBoot bypass for UEFI-compatible firmware based on Insyde H2O"][1143] - ["a bit more than just a trivial SecureBoot bypass for UEFI-compatible firmware based on Insyde H2O"][1144] - ["a fixed SecureBoot bypass for UEFI-compatible firmware based on Insyde H2O"][1108] - ["Hypervisors for Memory Introspection and Reverse Engineering"][1099] - ["Kernel Exploitation Techniques: Turning The (Page) Tables"][1100] - ["Kernel-hack-drill and a new approach to exploiting CVE-2024-50264 in the Linux kernel"][1180] - ["Inside Riot Vanguard's Dispatch Table Hooks"][1073] - ["Intercepting HTTPS Communication in Flutter: Going Full Hardcore Mode with Frida"][1079] - "iOS 17: New Version, New Acronyms": - [Part 1][1042] - [Part 2][1043] - ["kASLR Internals and Evolution"][1095] - ["Kernel-Hack-Drill: Environment For Developing Linux Kernel Exploits"][1082] - ["KernelSnitch: Side-Channel Attacks on Kernel Data Structures"][1005] - ksmbd (doyensec): - ["ksmbd vulnerability research"][1033] - ["Fuzzing Improvements and Vulnerability Discovery"][1175] - ["Exploiting CVE-2025-37947"][1176] - ["Laser Fault Injection on a Budget: RP2350 Edition"][1017] - ["Last barrier destroyed, or compromise of Fuse Encryption Key for Intel Security Fuses"][1072] - ["Let Me Cook You a Vulnerability: Exploiting the Thermomix TM5"][1137] - ["Lifting Binaries, Part 0: Devirtualizing VMProtect and Themida: It's Just Flattening?"][1147] - ["Linux Kernel Exploitation For Beginners"][1113] - ["Linux Kernel Hfsplus Slab-out-of-bounds Write"][1066] - ["Linux kernel Rust module for rootkit detection"][1026] - ["Llama's Paradox - Delving deep into Llama.cpp and exploiting Llama.cpp's Heap Maze, from Heap-Overflow to Remote-Code Execution"][1011] - ["LunoBotnet: A Self-Healing Linux Botnet with Modular DDoS and Cryptojacking Capabilities"][1177] - ["Mali-cious Intent: Exploiting GPU Vulnerabilities (CVE-2022-22706 / CVE-2021-39793)"][1050] - ["MCTF 2025 - Write-up Sec Mem - Pwn"][1080] - ["Mindshare: Using Binary Ninja API to Detect Potential Use-after-free Vulnerabilities"][1069] - ["Modern (Kernel) Low Fragmentation Heap Exploitation"][1127] - ["My Emulation Goes to the Moon... Until False Flag"][1094] - ["NASA cFS version Aquila Software Vulnerability Assessment"][1056] - ["nRF51 RBPCONF bypass for firmware dumping"][1154] - ["One‑Click Memory Corruption in Alibaba’s UC Browser: Exploiting patch-gap V8 vulnerabilities to steal your data"][1193] - ["Oops! It's a kernel stack use-after-free: Exploiting NVIDIA's GPU Linux drivers"][1186] - ["Out-of-bound read in ANGLE CopyNativeVertexData from Compromised Renderer"][1148] - ["Overview of Map Exploitation in v8"][1075] - ["Patch-Gapping the Google Container-Optimized OS for $0"][1032] - ["PatchGuard Internals"][1092] - ["Phoenix: Rowhammer Attacks on DDR5 with Self-Correcting Synchronization"][1170] - ["Print Scan Hacks: Identifying multiple vulnerabilities acro ss multiple Brother devices"][1136] - ["Project Rain:L1TF"][1178] - ["Pwn2Own 2025: Pwning Lexmark’s Postscript Processor"][1194] - ["Pwn2Own Ireland 2024: Canon imageCLASS MF656Cdw"][4] - ["Pwn2Own Ireland 2024 – Ubiquiti AI Bullet"][1117] - ["pyghidra-mcp: Headless Ghidra MCP Server for Project-Wide, Multi-Binary Analysis"][1134] - ["Python Dirty Arbitrary File Write to RCE via Writing Shared Object Files Or Overwriting Bytecode Files"][1087] - ["Qualcomm DSP Kernel Internals"][1135] - ["Race Against Time in the Kernel’s Clockwork"][1160] - ["Recovering Metadata from .NET Native AOT Binaries"][1089] - ["Reliable system call interception"][1010] - ["Replacing a Space Heater Firmware Over WiFi"][1020] - ["Reverse Engineering Hanwha Security Camera Firmware File Decryption with IDA Pro"][1093] - ["Reverse engineering Realtek RTL8761B* Bluetooth chips, to make better Bluetooth security tools & classes"][1201] - ["Reversing, Discovering, And Exploiting A TP-Link Router Vulnerability — CVE-2024–54887"][1013] - ["Reversing Samsung's H-Arx Hypervisor Framework - Part 1"][1036] - ["Reversing the QardioArm"][1048] - ["Reviving the modprobe_path Technique: Overcoming search_binary_handler() Patch"][1071] - ["Root Shell on Credit Card Terminal"][1112] - ["Rooting the TP-Link Tapo C200 Rev.5"][1130] - ["ROPing our way to RCE"][1028] - ["RV130X Firmware Analysis"][1025] - ["Security through Transparency: Tales from the RP2350 Hacking Challenge"][1187] - ["SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon"][1060] - ["smoltalk: RCE in Open Source Agents"][1045] - ["Solo: A Pixel 6 Pro Story (When one bug is all you need)"][1128] - ["SoK: Security of EMV Contactless Payment Systems"][1088] - ["Sound and Efficient Generation of Data-Oriented Exploits via Programming Language Synthesis"][1034] - ["Stack Overflows, Heap Overflows, and Existential Dread"][1150] - ["State of Linux Snapshot Fuzzing"][1078] - ["STM32L05 Voltage Glitching"][1111] - ["Streaming Zero-Fi Shells to Your Smart Speaker"][1096] - ["System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the System"][1196] - ["The Art of Linux Kernel Rootkits"][1008] - "The Evolution of Dirty COW": - [Part 1][1062] - [Part 2][1063] - ["The Journey of Bypassing Ubuntu’s Unprivileged Namespace Restriction"][1116] - ["TLS NoVerify: Bypass All The Things"][1165] - ["Tp-Link Router Deep Research"][1203] - ["Tracing Back to the Source | SPTM Round 3"][1046] - ["Turning Camera Surveillance on its Axis"][1158] - ["Untangling the Knot: Breaking Access Control in Home Wireless Mesh Networks"][1126] - ["Use-After-Free Vulnerability in the Can BCM Subsystem Leading to Information Disclosure (CVE-2023-52922)"][1133] - ["VMware Workstation guest-to-host escape"][1161] - ["We are ARMed no more ROPpery Here"][1016] - "When a Wi-Fi SSID Gives You Root on an MT02 Repeater" - [Part 1][1156] - [Part 2][1157] - ["When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks"][1067] - ["Windows arm64 Internals: Deconstructing Pointer Authentication"][1190] - ["Windows Heap Exploitation - From Heap Overflow to Arbitrary R/W"][1195] - "Windows Inter Process Communication A Deep Dive Beyond the Surface" - [Part 1][1204] - [Part 1][1205] - [Part 1][1206] - [Part 1][1207] - [Part 1][1208] - ["WireTap: Breaking Server SGX via DRAM Bus Interposition"][1183] - ["Writing a Ghidra processor module"][1064] - ["You Already Have Our Personal Data, Take Our Phone Calls Too"][1140] - ["Zen and the Art of Microcode Hacking"][1027] ## 2024 - ["1-click Exploit in South Korea's biggest mobile chat app"][965] - ["4 exploits, 1 bug: exploiting cve-2024-20017 4 different ways"][959] - "64 bytes and a ROP chain – A journey through nftables": - [Part 1][865] - [Part 2][866] - "nix libX11: Uncovering and exploiting a 35-year-old vulnerability": - [Part 1][703] - [Part 2][704] - ["A few notes on AWS Nitro Enclaves: Images and attestation"][738] - ["A first look at Android 14 forensics"][669] - ["A "Gau-Hack" from EuskalHack"][893] - ["A Journey From sudo iptables To Local Privilege Escalation"][1009] - ["A Practical Guide to PrintNightmare in 2024"][709] - ["A Technical Deep Dive: Comparing Anti-Cheat Bypass and EDR Bypass "][714] - ["A Trip Down Memory Lane"][715] - [AArch64 memory and paging][1015] - ["An Introduction to Chrome Exploitation - Maglev Edition"][882] - ["An unexpected journey into Microsoft Defender's signature World"][876] - ["Analysis of CVE-2024-21310 Pool Overflow Windows Cloud Filter Driver"][952] - ["Advanced CyberChef Techniques For Malware Analysis - Detailed Walkthrough and Examples"][736] - ["AES-GCM and breaking it on nonce reuse"][912] - ["Analyzing Mutation-Coded - VM Protect and Alcatraz English"][834] - ["ARLO: I'M WATCHING YOU"][810] - ["ASLRn’t: How memory alignment broke library ASLR"][731] - ["Attack of the clones: Getting RCE in Chrome’s renderer with duplicate object properties"][911] - ["Attacking Android Binder: Analysis and Exploitation of CVE-2023-20938"][852] - ["Automotive Memory Protection Units: Uncovering Hidden Vulnerabilities"][1173] - "Base64 Beyond Encoding" - [Part 1][945] - [Part 2][946] - ["Becoming any Android app via Zygote command injection"][863] - ["Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems"][895] - ["BGGP4: A 420 Byte Self-Replicating UEFI App For x64"][728] - ["Binary type inference in Ghidra"][905] - ["Blackbox-Fuzzing of IoT Devices Using the Router TL-WR902AC as Example"][803] - ["Breaking the Barrier: Post-Barrier Spectre Attacks"][970] - ["Breaking Down Adversarial Machine Learning Attacks Through Red Team Challenges"][987] - ["Breaking Down Multipart Parsers: File upload validation bypass"][966] - ["Breaking the Flash Encryption Feature of Espressif’s Parts"][589] - ["Bus Pirate 5: The Swiss ARRRmy Knife of Hardware Hacking"][886] - ["Buying Spying Insights into Commercial Surveillance Vendors"][733] - ["Bypassing EDRs With EDR-Preloading"][716] - ["Bytecode Breakdown: Unraveling Factorio's Lua Security Flaws"][920] - "Chaining N-days to Compromise All": - [Part 1][836] - [Part 2][837] - [Part 3][838] - [Part 4][839] - [Part 5][840] - ["Check Point - Wrong Check Point (CVE-2024-24919)"][875] - ["Code injection on Android without ptrace"][874] - "CodeQL zero to hero": [Part 1][858] [Part 2][859] [Part 3][860] [Part 4][1191] [Part 5][1192] - ["Commonly Abused Linux Initial Access Techniques and Detection Strategies"][896] - ["Compiler Options Hardening Guide for C and C++"][877] - ["Continuously fuzzing Python C extensions"][734] - ["corCTF 2024: trojan-turtles writeup"][929] - ["corMine 1 and 2"][948] - ["Cross-Process Spectre Exploitation"][969] - ["CVE-2024-20356: Jailbreaking a Cisco appliance to run DOOM"][861] - ["CVE-2022-2586 Writeup"][849] - ["CVE-2020-27786 ( Race Condition + Use-After-Free )"][967] - ["CVE-2022-4262"][864] - ["CVE-2024-5274: A Minor Flaw in V8 Parser Leading to Catastrophes"][1012] - ["CVE-2023-6246: Heap-based buffer overflow in the glibc's syslog()"][697] - ["Declawing PUMAKIT"][989] - [Deep Dive into RCU Race Condition: Analysis of TCP-AO UAF (CVE-2024–27394)][1003] - ["Denial of Pleasure: Attacking Unusual BLE Targets with a Flipper Zero"][699] - ["Deobfuscating Android ARM64 strings with Ghidra: Emulating, Patching, and Automating"][683] - ["Dissecting a complex vulnerability and achieving arbitrary code execution in Ichitaro Word"][805] - ["Diving Deep into F5 Secure Vault"][918] - ["DJI - The ART of obfuscation"][705] - ["Docker Security – Step-by-Step Hardening (Docker Hardening)"][729] - ["Driving forward in Android drivers"][908] - ["Emulating RH850 architecture with Unicorn Engine"][853] - "Everyday Ghidra: Ghidra Data Types" - [Part 1][973] - [Part 2][974] - ["Exploit detail about CVE-2024-26581"][944] - ["Exploring AMD Platform Secure Boot"][701] - ["Exploring GNU extensions in the Linux kernel"][878] - ["Exploiting Android’s Hardened Memory Allocator"][1030] - ["Exploiting Empire C2 Framework"][723] - "Exploiting Enterprise Backup Software For Privilege Escalation": - [Part 1][906] - [Part 2][907] - "Exploiting Reversing (ER) series": - [Article 01][583] - [Article 02][584] - ["Exploiting Steam: Usual and Unusual Ways in the CEF Framework"][898] - ["Exploring object file formats"][684] - ["Extracting Secure Onboard Communication (SecOC) keys from a 2021 Toyota RAV4 Prime"][735] - ["Fault Injection Attacks against the ESP32-C3 and ESP32-C6"][590] - ["Fault Injection – Down the Rabbit Hole"][993] - "Finding Bugs in Kernel": - [Part 1][996] - [Part 2][997] - ["Flatlined: Analyzing Pulse Secure Firmware and Bypassing Integrity Checking"][883] - ["Flipping Pages: An analysis of a new Linux vulnerability in nf_tables and hardened exploitation techniques"][804] - ["From fault injection to RCE"][990] - ["From object transition to RCE in the Chrome renderer"][940] - ["Fuzzing between the lines in popular barcode software"][968] - ["Gaining kernel code execution on an MTE-enabled Pixel 8"][808] - ["Ghidra nanoMIPS ISA module"][873] - ["Going Native - Malicious Native Applications"][842] - ["Google Chrome V8 CVE-2024-0517 Out-of-Bounds Write Code Execution"][674] - ["GhostRace: Exploiting and Mitigating Speculative Race Conditions"][802] - ["GPUAF - Two ways of Rooting All Qualcomm based Android phones"][994] - ["GraphStrike: Anatomy of Offensive Tool Development"][712] - ["Hacking a 2014 tablet... in 2024!"][932] - ["Hacking a Smart Home Device"][691] - ["Hacking Android Games"][949] - ["Heap exploitation, glibc internals and nifty tricks"][938] - ["HEAP HEAP HOORAY — Unveiling GLIBC heap overflow vulnerability (CVE-2023–6246)"][818] - ["Hi, My Name is Keyboard"][676] - ["Hiding Linux Processes with Bind Mounts"][925] - ["How I Also Hacked my Car"][976] - ["How to Bypass Golang SSL Verification"][941] - ["Hunting Bugs in Linux Kernel With KASAN: How to Use it & What's the Benefit?"][995] - ["unting down the HVCI bug in UEFI"][668] - ["Hunting for Unauthenticated n-days in Asus Routers"][662] - "Iconv, Set the Charset to RCE": - [Part 1][870] - [Part 2][871] - ["Java Deserialization Tricks"][815] - ["JTAG Hacking with a Raspberry Pi"][851] - ["Kuiper Ransomware’s Evolution"][702] - ["Inside a New OT/IoT Cyberweapon: IOCONTROL"][1001] - ["Inside the LogoFAIL PoC: From Integer Overflow to Arbitrary Code Execution"][692] - ["Introduction to Fuzzing Android Native Components"][984] - "Learning LLVM": - [Part 1][934] - [Part 2][935] - ["LeftoverLocals: Listening to LLM responses through leaked GPU local memory"][687] - ["Leveraging Binary Ninja il to Reverse a Custom ISA: Cracking the “pot of gold” 37C3"][612] - ["Linux Kernel Attack Surface: beyond IOCTL. DMA-BUF"][999] - "Linux Kernel Exploitation": - ["Environment"][922] - ["ret2usr"][923] - ["Listen Up: Sonos Over-The-Air Remote Kernel Exploitation and Covert Wiretap – BlackHat USA 2024 Whitepaper"][939] - "ManageEngine ADAudit - Reverse engineering Windows RPC to find CVEs": - [Part 1][901] - [Part 2][902] - [Part 3][903] - ["Mind the Patch Gap: Exploiting an io_uring Vulnerability in Ubuntu"][809] - ["Mali GPU Kernel LPE"][786] - ["MalpediaFLOSSed"][814] - ["Microsoft BitLocker Bypasses are Practical"][718] - ["Modern implant design: position independent malware development"][690] - ["My new superpower"][688] - ["Not the Drones You're Looking For"][825] - "Operation triangulation": - ["Keychain module analysis"][823] - ["audio module analysis"][824] - ["OtterRoot: Netfilter Universal Root 1-day"][986] - ["Out-of-bounds read & write in the glibc's qsort()"][698] - ["PageJack: A Powerful Exploit Technique With Page-Level UAF"][951] - ["Page-Oriented Programming: Subverting Control-Flow Integrity of Commodity Operating System Kernels with Non-Writable Code Pages"][1000] - ["Patch Tuesday Diffing: CVE-2024-20696 - Windows Libarchive RCE"][835] - ["Pinning User-space Pages in the Linux Kernel: Exploring get_user_pages, pin_user_pages, and Page Table Walking"][983] - ["PixieFail: Nine vulnerabilities in Tianocore's EDK II IPv6 network stack"][711] - ["Playing with libmalloc in 2024"][610] - ["Puckungfu 2: Another NETGEAR WAN Command Injection"][730] - ["Pumping Iron on the Musl Heap – Real World CVE-2022-24834 Exploitation on an Alpine mallocng Heap"][910] - ["Pwn2Own Automotive 2024: Hacking the ChargePoint Home Flex (and their cloud...)"][933] - ["Pwning browsers like a kernel"][957] - "Pwn2Own: WAN-to-LAN Exploit Showcase": - ["Pwn2Own: WAN-to-LAN Exploit Showcase, Part 1"][950] - ["Pwn2Own: Pivoting from WAN to LAN to Attack a Synology BC500 IP Camera, Part 2"][942] - "Pwn2Own Toronto 2023": - ["How it all started"][829] - ["Exploring the Attack Surface"][830] - ["Exploration"][831] - ["Memory Corruption Analysis"][832] - ["The Exploit"][833] - ["Pwning a Brother labelmaker, for fun and interop!"][897] - "Pwntools 10x": - [Part 1][867] - [Part 2][868] - [Part 3][869] - ["Pygmy Goat"][972] - ["Recovering an ECU firmware using disassembler and branches"][921] - ["regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)"][919] - ["Resolving Stack Strings with Capstone Disassembler & Unicorn in Python"][846] - ["Retrofitting encrypted firmware is a Bad Idea"][1024] - ["Reverse engineering a car key fob signal "][801] - ["Reverse Engineering and Dismantling Kekz Headphones"][962] - ["Reverse Engineering Protobuf Definitions From Compiled Binaries"][820] - ["Reverse engineering the 59-pound printer onboard the Space Shuttle"][943] - ["Reverse Engineering the AM335x Boot ROM"][947] - ["Reverse Engineering The Stream Deck Plus"][1004] - "Ring Around The Regex" - [Part 1][955] - [Part 2][956] - ["RISCVuzz: Discovering Architectural CPU Vulnerabilities via Differential Hardware Fuzzing"][958] - ["RomCom exploits Firefox and Windows zero days in the wild"][981] - ["ROPing Routers from scratch: Step-by-step Tenda Ac8v4 Mips 0day Flow-control ROP -> RCE"][892] - ["Route to Safety: Navigating Router Pitfalls"][816] - ["Rooting a Hive Camera"][819] - ["SAME70 Emulator"][879] - "Say Friend and Enter": - [Part 1][812] - [Part 2][813] - ["Samsung NX related posts"][887] - ["Scavy: Automated Discovery of Memory Corruption Targets in Linux Kernel for Privilege Escalation"][975] - ["SECGlitcher (Part 1) - Reproducible Voltage Glitching on STM32 Microcontrollers"][862] - ["SELinux bypasses"][963] - ["SLUB Internals for Exploit Developers"][980] - ["SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel"][937] - ["Shell We Assemble?"][689] - ["Shellcode evasion using WebAssembly and Rust"][726] - "SMM isolation": - ["SMI deprivileging (ISRD)"][847] - ["Security policy reporting (ISSR)"][848] - ["SoK: Where’s the “up”?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems"][1049] - ["Strengthening the Shield: MTE in Heap Allocators"][596] - ["Take a Step Further: Understanding Page Spray in Linux Kernel Exploitation"][913] - ["The architecture of SAST tools: An explainer for developers"][739] - ["The Dark Side of UEFI: A technical Deep-Dive into Cross-Silicon Exploitation"][880] - ["The Definitive Guide to Linux Process Injection"][971] - ["The 'Invisibility Cloak' - Slash-Proc Magic"][924] - ["The Qualcomm DSP Driver - Unexpectedly Excavating an Exploit"][1007] - ["The rev.ng decompiler goes open source + start of the UI closed beta"][694] - ["The tale of a GSM Kernel LP"][850] - ["The Wild West of Proof of Concept Exploit Code (PoC)"][926] - "The Windows Registry Adventure": - [Part 1][914] - [Part 2][915] - [Part 3][916] - ["TIKTAG: Breaking ARM’s Memory Tagging Extension with Speculative Execution"][894] - ["Tony Hawk’s Pro Strcpy"][928] - ["Toolchain Necromancy: Past Mistakes Haunting ASLR"][732] - ["TP-Link Firmware Decryption C210 V2 cloud camera bootloaders"][988] - ["TP-Link TDDP Buffer Overflow Vulnerability"][695] - ["Two Bytes is Plenty: FortiGate RCE with CVE-2024-21762"][787] - ["Understanding AddressSanitizer: Better memory safety for your code"][889] - ["Understanding Unix Garbage Collection and its Interaction with io_uring"][891] - ["Understanding Windows x64 Assembly"][693] - ["Using Symbolic Execution to Devirtualise a Virtualised Binary"][936] - ["Utilizing Cross-CPU Allocation to Exploit Preempt-Disabled Linux Kernel"][985] - ["VBA: having fun with macros, overwritten pointers & R/W/X memory"][843] - ["Vulnerabilities of Realtek SD card reader driver"][1002] - ["Why Code Security Matters - Even in Hardened Environments"][953] - ["Windows Secure-Launch on Qualcomm devices"][811] - ["Windows Sockets: From Registered I/O to SYSTEM Privileges"][998] - ["Windows vs Linux Loader Architecture"][844] - ["Windows Wi-Fi Driver RCE Vulnerability – CVE-2024-30078"][954] - "Writing a Debugger From Scratch" - ["Attaching to a Process"][449] - ["Register State and Stepping"][450] - ["Reading Memory"][451] - ["Exports and Private Symbols"][452] - ["Breakpoints"][453] - ["Stacks"][454] - ["Disassembly"][455] - ["Writing a system call tracer using eBPF"][931] - ["Your NVMe Had Been Syz’ed: Fuzzing NVMe-oF/TCP Driver for Linux with Syzkaller"][854] - ["x64 Return Address Spoofing"][991] - ["x64 Call Stack Spoofing"][992] ## 2023 - ["A Deep Dive Into Brute Ratel C4 Payloads"][374] - ["A Deep Dive into Penetration Testing of macOS Applications (Part 1)"][49] - ["A Deep Dive into TPM-based BitLocker Drive Encryption"][611] - ["A Detailed Look at Pwn2own Automotive EV Charger Hardware"][537] - ["A LibAFL Introductory Workshop"][826] - ["A look at CVE-2023-29360, a beautiful logical LPE vuln"][260] - ["A Journey Into Hacking Google Search Appliance"][203] - ["A new method for container escape using file-based DirtyCred"][201] - ["A Pain in the NAS: Exploiting Cloud Connectivity to PWN your NAS: Synology DS920+ Edition"][273] - ["A Potholing Tour in a SoC"][189] - "A Practical Tutorial on PCIe for Total Beginners on Windows": - [Part 1][806] - [Part 2][807] - ["A Race to Report a TOCTOU: Analysis of a Bug Collision in Intel SMM"][255] - ["A Red-Teamer diaries"][156] - ["A story about tampering EDRs"][293] - ["Abusing Liftoff assembly and efficiently escaping from sbx"][677] - ["Abusing RCU callbacks with a Use-After-Free read to defeat KASLR"][857] - ["Abusing undocumented features to spoof PE section headers"][139] - ["Achieving Remote Code Execution in Steam: a journey into the Remote Play protocol"][587] - ["All about LeakSanitizer"][460] - ["All cops are broadcasting: TETRA under scrutiny"][237] - ["All my favorite tracing tools: eBPF, QEMU, Perfetto, new ones I built and more"][513] - ["An analysis of an in-the-wild iOS Safari WebContent to GPU Process exploit"][392] - ["An Introduction into Stack Spoofing"][580] - ["Analysis on legit tools abused in human operated ransomware"][4] - "Analysis of CVE-2023-3519 in Citrix ADC and NetScaler Gateway": - [Part 1][196] - [Part 2][197] - ["Analysis of VirtualBox CVE-2023-21987 and CVE-2023-21991"][119] - ["Analyzing a Modern In-the-wild Android Exploit"][379] - ["Analyzing an Old Netatalk dsi_writeinit Buffer Overflow Vulnerability in NETGEAR Route"][326] - "ARM64 Reversing And Exploitation" (8ksec) - [Part 1][107] - [Part 2][108] - [Part 3][109] - [Part 4][110] - [Part 5][111] - [Part 6][112] - [Part 7][113] - [Part 8][388] - [Part 9][389] - [Part 10][390] - "Attacking an EDR" - [Part 1][395] - [Part 2][396] - ["Attacking IoT Devices from Web Perspective"][608] - ["Attacking JS engines: Fundamentals for understanding memory corruption crashes"][720] - ["Audio with embedded Linux training"][267] - ["Automating C2 Infrastructure with Terraform, Nebula, Caddy and Cobalt Strike"][300] - ["b3typer - bi0sCTF 2022"][55] - ["Back to the Future with Platform Security"][97] - ["Bash Privileged-Mode Vulnerabilities in Parallel Desktop and CDPATH Handling in MacOS"][100] - ["Bee-yond Capacity: Unauthenticated RCE in Extreme Networks/Aerohive Wireless APs - CVE-2023-35803"][91] - ["Behind the Shield: Unmasking Scudos's Defenses"][8] - ["BlackLotus UEFI bootkit: Myth confirmed"][429] - ["BLUFFS: Bluetooth Forward and Future Secrecy Attacks and Defenses"][618] - ["BPF Memory Forensics with Volatility 3"][881] - ["Breaking Fortinet Firmware Encryption"][233] - ["Breaking the Code - Exploiting and Examining CVE-2023-1829 in cls_tcindex Classifier Vulnerability"][81] - ["Breaking Secure Boot on the Silicon Labs Gecko platform"][262] - ["Building a Custom Mach-O Memory Loader for macOS"][523] - ["Building an Exploit for FortiGate Vulnerability CVE-2023-27997"][475] - ["Bypassing a noexec by elf roping"][528] - ["Bypassing PPL in Userland (again)"][308] - ["Bypassing SELinux with init_module"][494] - "C101101: D-Link DIR-865L": - ["Remote Code Execution (pre-auth)"][599] - ["Unsigned firmware upload lead to persistent backdoor (pre-auth)"][600] - ["Memory corruptions lead to Remote Code Execution (pre-auth)"][601] - ["CAN Injection: keyless car theft"][195] - "chonked" - ["minidlna 1.3.2 http chunk parsing heap overflow (cve-2023-33476) root cause analysis"][193] - ["exploiting cve-2023-33476 for remote code execution"][194] - ["Code Execution in Chromium’s V8 Heap Sandbox"][896] - ["Coffee: A COFF loader made in Rust"][93] - ["Competing in Pwn2Own ICS 2022 Miami: Exploiting a zero click remote memory corruption in ICONICS Genesis64"][397] - ["Conquering the memory through io_uring - Analysis of CVE-2023-2598"][528] - "Cracking Windows Kernel with HEVD" - ["Chapter 0"][656] - ["Chapter 1"][657] - ["Chapter 2"][658] - ["Chapter 3"][659] - ["Chapter 4"][660] - ["Cueing up a calculator: an introduction to exploit development on Linux"][534] - "Customizing Sliver": - [Part 1][603] - [Part 2][604] - [Part 3][605] - ["CVE-2022-27666: My file your memory"][616] - ["CVE-2023-0179: Linux kernel stack buffer overflow in nftables: PoC and writeup"][567] - ["CVE-2023-2008 - Analyzing and exploiting a bug in the udmabuf driver"][72] - ["CVE-2023-23504: XNU Heap Underwrite in dlil.c"][543] - ["CVE-2023-26258 – Remote Code Execution in ArcServe UDP Backup"][99] - ["CVE-2023-36844 And Friends: RCE In Juniper Devices"][281] - ["CVE-2023-38408: Remote Code Execution in OpenSSH's forwarded ssh-agent"][186] - ["cURL audit: How a joke led to significant findings"][459] - ["D^ 3CTF2023 d3kcache: From null-byte cross-cache overflow to infinite arbitrary read & write."][964] - ["Debugger Ghidra Class"][28] - ["Debugging D-Link: Emulating firmware and hacking hardware"][290] - ["Decompilation Debugging"][508] - ["Deep Lateral Movement in OT Networks: When is a Perimeter not a Perimeter?"][253] - ["Defining the cobalt strike reflective loader"][320] - ["Demystifying bitwise operations, a gentle C tutorial"][400] - ["Detecting and decrypting Sliver C2 – a threat hunter’s guide"][480] - ["Detecting BPFDoor Backdoor Variants Abusing BPF Filters"][183] - ["Dirty Pagetable: A Novel Exploitation Technique To Rule Linux Kernel"][51] - ["Dissecting and Exploiting TCP/IP RCE Vulnerability “EvilESP”"][164] - ["Diving Into Smart Contract Decompilation"][204] - ["Diving into Starlink's User Terminal Firmware"][268] - "DJI Mavic 3 Drone Research" - ["Firmware Analysis"][376] - ["Vulnerability Analysis"][713] - ["Drone Security and Fault Injection Attacks"][82] - "DualShock4 Reverse Engineering": - [Part 1][149] - [Part 3][150] - [Part 3][151] - ["eBPF: A new frontier for malware"][621] - ["Emulating IoT Firmware Made Easy: Start Hacking Without the Physical Device"][47] - ["Encrypted Doesn't Mean Authenticated: ShareFile RCE (CVE-2023-24489)"][182] - ["ENLBufferPwn (CVE-2022-47949)"][422] - ["Escaping the Google kCTF Container with a Data-Only Exploit"][178] - ["Exploitation of a kernel pool overflow from a restrictive chunk size (CVE-2021-31969)"][827] - ["Exploitation of Openfire CVE-2023-32315"][283] - ["Exploiting a Critical Spoofing Vulnerability in Windows CryptoAPI"][572] - ["Exploiting a Flaw in Bitmap Handling in Windows User-Mode Printer Drivers"][130] - ["Exploiting CVE-2021-3490 for Container Escapes"][552] - ["Exploiting null-dereferences in the Linux kernel"][148] - ["Exploring UNIX pipes for iOS kernel exploit primitives"][514] - ["EPF: Evil Packet Filter"][73] - ["Escaping from Bhyve"][192] - ["ESP32-C3 Wireless Adventure A Comprehensive Guide to IoT"][69] - ["Espressif ESP32: Breaking HW AES with Electromagnetic Analysis"][394] - ["Espressif ESP32: Breaking HW AES with Power Analysis"][393] - ["Examining OpenSSH Sandboxing and Privilege Separation – Attack Surface Analysis"][324] - ["Executing Arbitrary Code & Executables in Read-Only FileSystems"][52] - ["Exploit Engineering – Attacking the Linux Kernel"][146] - ["Exploiting a Remote Heap Overflow with a Custom TCP Stack"][322] - ["Exploring Hell's Gate"][594] - ["Exploiting a bug in the Linux kernel with Zig"][597] - ["Exploiting HTTP Parsers Inconsistencies"][391] - ["Exploiting MikroTik RouterOS Hardware with CVE-2023-30799"][198] - ["Exploring Android Heap Allocations in Jemalloc 'New'"][7] - ["Exploring Linux's New Random Kmalloc Caches"][511] - ["Exploring the section layout in linker output"][609] - "Fantastic Rootkits: And Where To Find Them": - [Part 1][275] - [Part 2][276] - [Part 3][277] - ["Few lesser known tricks, quirks and features of C"][354] - ["Finding and exploiting process killer drivers with LOL for 3000$"][172] - ["Finding bugs in C code with Multi-Level IR and VAST"][92] - ["Finding Gadgets for CPU Side-Channels with Static Analysis Tools"][75] - ["For Science! - Using an Unimpressive Bug in EDK II to Do Some Fun Exploitation"][70] - ["FortiNAC - Just a few more RCEs"][95] - ["Fortinet Series 3 — CVE-2022–42475 SSLVPN exploit strategy"][32] - ["Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues"][90] - ["From C, with inline assembly, to shellcode"][235] - "Fuzzing Farm": - ["Fuzzing GEGL with fuzzuf"][43] - ["Evaluating Performance of Fuzzer"][44] - ["Patch Analysis and PoC Development"][45] - ["Hunting and Exploiting 0-day \[CVE-2022-24834\]"][46] - ["Fuzzing Golang msgpack for fun and panic"][643] - ["Getting RCE in Chrome with incomplete object initialization in the Maglev compiler"][486] - "Ghidra" (Craig Young): - ["A Guide to Reversing Shared Objects with Ghidra"][121] - ["Reversing a Simple CrackMe with Ghidra Decompiler"][122] - ["Vulnerability Hunting with Ghidra"][123] - ["Patching a Bug from a Ghidra Listing"][124] - ["Vulnerability Analysis with Ghidra Scripting"][125] - ["Ghost In The Wire, Sonic In The Wall - Adventures With SonicWall"][481] - ["Google Chrome V8 ArrayShift Race Condition Remote Code Execution"][530] - ["Hacking a Tapo TC60 Camera"][350] - ["Hacking Amazon's eero 6 (part 1)"][86] - ["Hacking Brightway scooters: A case study"][29] - ["Hacking ICS Historians: The Pivot Point from IT to OT"][444] - ["Hacking the Nintendo DSi Browser"][456] - ["Hardware Hacking to Bypass BIOS Passwords"][5] - ["Heads up! Xdr33, A Variant Of CIA’s HIVE Attack Kit Emerges"][443] - ["How a simple K-TypeConfusion took me 3 months long to create a exploit? \[HEVD\] - Windows 11 (build 22621)"][240] - ["How does Linux start a process"][501] - "How NATs Work": - [Part 1][152] - [Part 2][153] - [Part 3][154] - [Part 4][155] - "How I Hacked my Car": - [Part 1][101] - [Part 2][102] - [Part 3][103] - [Part 4][104] - [Part 5][105] - [Part 6][106] - ["How I hacked smart lights: the story behind CVE-2022-47758"][841] - ["How to Emulate Android Native Libraries Using Qiling"][482] - ["How to Voltage Fault Injection"][685] - ["How To Secure A Linux Server"][140] - ["Hunting Vulnerable Kernel Drivers"][661] - ["Icicle: A Re-designed Emulator for Grey-Box Firmware Fuzzing"][171] - ["In-depth analysis on Valorant’s Guarded Regions"][141] - ["In-Memory-Only ELF Execution (Without tmpfs)"][355] - ["Intel BIOS Advisory – Memory Corruption in HID Drivers "][257] - ["Intercepting Allocations with the Global Allocator"][79] - ["Intro to Cutter"][637] - ["Introduction to SELinux"][59] - "IoT Series": - ["Are People Ready to go?"][465] - ["How To Build Kernel Image From Scratch"][466] - ["Firmware testing in QEMU"][467] - ["Debugging with GDB & GHIDRA + Zero-day"][468] - ["JTAG 'Hacking' the Original Xbox in 2023"][244] - ["Kernel Exploit Factory"][159] - ["Learn Makefiles With the tastiest examples"][24] - ["Let's build a Chrome extension that steals everything"][463] - ["Let’s Go into the rabbit hole — the challenges of dynamically hooking Golang programs"][387] - [Part 1][387] - [Part 2][904] - [Part 3][930] - ["Leveraging ssh-keygen for Arbitrary Execution (and Privilege Escalation)"][327] - ["lexmark printer haxx"][652] - [linux-re-101][169] - ["Linux debugging, profiling and tracing training"][353] - "Linux Kernel Exploitation" - ["Getting started & BOF"][678] - ["Heap techniques"][679] - ["Exploiting race-condition + UAF"][680] - "Linux Kernel PWN": - ["ret2dir"][899] - ["DirtyCred"][900] - ["Linux Kernel Unauthenticated Remote Heap Overflow Within KSMBD"][544] - ["Linux Kernel Teaching"][131] - ["Linux Malware: Defense Evasion Techniques"][165] - "Linux Red Team": - ["Exploitation Techniques"][222] - ["Privilege Escalation Techniques"][223] - ["Persistence Techniques"][224] - ["Linux Remote Process Injection - (Injecting into a firefox process)"][569] - ["Linux rootkits explained – Part 1: Dynamic linker hijacking"][60] - ["Linux Shellcode 101: From Hell to Shell"][53] - ["Local Privilege Escalation on the DJI500 Smart Controller"][160] - "Lord Of The Ring0": - [Part 1][10] - [Part 2][11] - [Part 3][12] - [Part 4][13] - [Part 5][14] - ["Low-Level Software Security for Compiler Developers"][15] - ["LPE and RCE in RenderDoc: CVE-2023-33865, CVE-2023-33864, CVE-2023-33863"][202] - ["Making TOCTOU Great again – X(R)IP"][474] - "Malware Reverse Engineering for Beginners": - [Part 1][128] - [Part 2][129] - ["Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects"][285] - "mast1c0re" - ["Introduction – Exploiting the PS4 and PS5 through a game save"][38] - ["Part 1 – Modifying PS2 game save files"][39] - ["Part 2 – Arbitrary PS2 code execution"][40] - ["Part 3 – Escaping the emulator"][41] - ["Mélofée: a new alien malware in the Panda's toolset targeting Linux hosts"][330] - ["Meterpreter vs Modern EDR(s)"][170] - "MTE As Implemented": - [Part 1][366] - [Part 2][367] - ["mTLS: When certificate authentication is done wrong"][270] - ["MSMQ QueueJumper (RCE Vulnerability): An in-depth technical analysis"][177] - ["Multiple Vulnerabilities in Qualcomm and Lenovo ARM-based Devices"][404] - "NetGear Series: Emulating Netgear R6700V3 circled binary ": - [Part 1][441] - [Part 2][442] - ["New HiatusRAT Router Malware Covertly Spies On Victims"][402] - ["No Alloc, No Problem: Leveraging Program Entry Points for Process Injection"][1091] - ["NVMe: New Vulnerabilities Made Easy"][264] - ["nftables Adventures: Bug Hunting and N-day Exploitation (CVE-2023-31248)"][365] - ["Obscure Windows File Types"][74] - ["Old Bug, Shallow Bug: Exploiting Ubuntu at Pwn2own Vancouver 2023"][254] - ["One shot, Triple kill"][700] - "OPC UA Deep Dive Series": - [Part 1][211] - [Part 2][212] - [Part 3][213] - [Part 4][214] - [Part 5][215] - ["OpenSSH Pre-Auth Double Free CVE-2023-25136 – Writeup and Proof-of-Concept"][42] - ["OrBit: advanced analysis of a Linux dedicated malware"][427] - ["OrBit: New Undetected Linux Threat Uses Unique Hijack of Execution Flow"][428] - ["P2PInfect: The Rusty Peer-to-Peer Self-Replicating Worm"][206] - ["P4wnP1-LTE"][209] - ["Patches, Collisions, and Root Shells: A Pwn2Own Adventure"][278] - ["Patch Tuesday -> exploit Wednesday: Pwning windows ancillary function driver for WinSock (afd.sys) in 24 hours"][297] - ["Persistence Techniques That Persist"][299] - ["Practical Introduction to BLE GATT Reverse Engineering: Hacking the Domyos EL500"][166] - ["prctl anon_vma_name: An Amusing Linux Kernel Heap Spray"][184] - ["Producing a POC for CVE-2022-42475 (Fortinet RCE)"][323] - ["Protecting Android clipboard content from unintended exposure"][448] - "Protecting the Phoenix: Unveiling Critical Vulnerabilities in Phoenix Contact HMI" - [Part 1][477] - [Part 2][478] - [Part 3][479] - ["Prototype Pollution in Python"][647] - ["PSPRAY: Timing Side-Channel based Linux Kernel Heap Exploitation Technique"][758] - ["PyLoose: Python-based fileless malware targets cloud workloads to deliver cryptominer"][98] - ["PwnAgent: A One-Click WAN-side RCE in Netgear RAX Routers with CVE-2023-24749"][318] - ["Pwnassistant - Controlling /home's via a Home Assistant RCE"][613] - ["Pwning Pixel 6 with a leftover patch"][310] - ["Pwning the tp-link ax1800 wifi 6 Router: Uncovered and Exploited a Memory Corruption Vulnerability"][309] - ["Racing Against the Lock: Exploiting Spinlock UAF in the Android Kernel"][185] - ["Readline crime: exploiting a SUID logic bug"][439] - ["Red vs. Blue: Kerberos Ticket Times, Checksums, and You!"][30] - ["Reptar"][527] - ["Restoring Dyld Memory Loading"][522] - ["Retreading The AMLogic A113X TrustZone Exploit Process"][77] - ["Reversing UK mobile rail tickets"][551] - "Reversing Windows Container": - [Part 1][821] - [Part 2][822] - ["RISC-V Bytes: Exploring a Custom ESP32 Bootloader"][493] - ["REUnziP: Re-Exploiting Huawei Recovery With FaultyUSB"][364] - ["Revisiting CVE-2017-11176"][48] - "Rooting the FiiO M6": - ["Using the "World's Worst Fuzzer" To Find A Kernel Bug"][499] - ["Writing an LPE Exploit For Our Overflow Bug"][500] - ["Rooting Xiaomi WiFi Routers"][817] - ["Rust Binary Analysis, Feature by Feature"][231] - ["Rust to Assembly: Understanding the Inner Workings of Rust"][134] - "Rustproofing Linux": - [Part 1][575] - [Part 2][576] - [Part 3][577] - [Part 4][578] - ["scudo Hardened Allocator — Unofficial Internals Documentation"][706] - ["Securing our home labs: Frigate code review"][615] - ["Securing our home labs: Home Assistant code review"][614] - ["SHA-1 gets SHAttered"][325] - ["Shambles: The Next-Generation IoT Reverse Engineering Tool to Discover 0-Day Vulnerabilities"][55] - ["Shell in the Ghost: Ghostscript CVE-2023-28879 writeup"][76] - ["Shifting boundaries: Exploiting an Integer Overflow in Apple Safari"][261] - ["Shooting Yourself in the .flags – Jailbreaking the Sonos Era 100"][531] - ["Smart Speaker Shenanigans: Making the Sonos ONE Sing its Secrets"][504] - ["Smashing the state machine: the true potential of web race conditions"][271] - ["SRE deep dive into Linux Page Cache"][94] - ["Sshimpanzee"][16] - ["Stepping Insyde System Management Mode"][256] - ["Sudoedit bypass in Sudo <= 1.9.12p1 CVE-2023-22809"][562] - ["THC's favourite Tips, Tricks & Hacks (Cheat Sheet)"][31] - ["The ARM32 Scheduling and Kernelspace/Userspace Boundary"][512] - ["The art of Fuzzing: Introduction"][57] - ["The art of fuzzing: Windows Binaries"][89] - ["The art of fuzzing-A Step-by-Step Guide to Coverage-Guided Fuzzing with LibFuzzer"][54] - ["The Art Of Linux Persistence"][872] - ["The Blitz Tutorial Lab on Fuzzing with AFL++"][303] - ["The code that wasn’t there: Reading memory on an Android device by accident"][462] - ["The Dragon Who Sold His camaro: Analyzing Custom Router Implant"][228] - ["The Importance of Reverse Engineering in Network Analysis"][426] - ["The Linux Kernel Module Programming Guide"][3] - ["The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders"][284] - ["The Role of the Control Flow Graph in Static Analysis"][509] - ["The Silent Spy Among Us: Smart Intercom Attacks"][331] - ["The Stack Series: The X64 Stack"][356] - ["The Untold Story of the BlackLotus UEFI Bootkit"][205] - ["Tickling ksmbd: fuzzing SMB in the Linux kernel"][386] - ["Tool Release: Cartographer"][371] - ["Total Identity Compromise: Microsoft Incident Response lessons on securing Active Directory"][445] - ["Xortigate, or CVE-2023-27997 - The Rumoured RCE That Was"][80] - ["Your not so "Home Office" - SOHO Hacking at Pwn2Own"][5] - ["Ubuntu Shiftfs: Unbalanced Unlock Exploitation Attempt"][524] - ["Unauthenticated RCE on a RIGOL oscilloscope"][210] - ["UNCONTAINED: Uncovering Container Confusion in the Linux Kernel"][37] - ["Uncovering a crazy privilege escalation from Chrome extensions"][502] - ["Uncovering HinataBot: A Deep Dive into a Go-Based Threat"][311] - ["Under The Hood - Disassembling of IKEA-Sonos Symfonisk Speaker Lamp"][180] - ["Understanding a Payload’s Life Featuring Meterpreter & Other Guests "][315] - ["Understanding Dirty Pagetable - m0leCon Finals 2023 CTF Writeup"][591] - ["Understanding the Heap - a beautiful mess"][348] - ["Unleashing ksmbd: crafting remote exploits of the Linux kernel"][828] - ["Unleashing ksmbd: remote exploitation of the Linux kernel (ZDI-23-979, ZDI-23-980)"][533] - ["Unlimited Results: Breaking Firmware Encryption of ESP32-VV"][598] - "Unveiling secrets of the ESP32": - ["creating an open-source MAC Layer"][653] - ["reverse engineering RX"][654] - ["Web Hackers vs. The Auto Industry: Critical Vulnerabilities in Ferrari, BMW, Rolls Royce, Porsche, and More"][648] - ["What is Loader Lock?"][845] - ["Windows Installer arbitrary content manipulation Elevation of Privilege (CVE-2020-0911)"][58] - ["Windows Installer EOP (CVE-2023-21800)"][314] - ["Writing your own RDI /sRDI loader using C and ASM"][307] - ["Zenbleed"][207] - ["Zero Effort Private Key Compromise: Abusing SSH-Agent For Lateral Movement"][248] ## 2022 - "A journey into IoT": - ["Chip identification, BUSSide, and I2C"][294] - ["Discover components and ports"][295] - ["Firmware dump and analysis"][296] - ["Radio communications"][681] - ["Internal communications"][682] - ["A Kernel Hacker Meets Fuchsia OS"][710] - "A Technical Analysis of Pegasus for Android": - [part 1][564] - [Part 2][565] - [Part 3][566] - ["ALL ABOUT USB-C: INTRODUCTION FOR HACKERS"][747] - ["An In-Depth Look at the ICE-V Wireless FPGA Development Board"][779] - "ARM 64 Assembly Series": - ["Basic definitions and registers"][408] - ["Offset and Addressing modes"][409] - ["Load and Store"][410] - ["Branch"][411] - ["Data Processing (Part 1)"][412] - ["Data Processing (Part 2)"][413] - ["selections and loops"][414] - ["Subroutines"][415] - ["Attacking the Android kernel using the Qualcomm TrustZone"][885] - ["Attacking Titan M with Only One Byte"][259] - ["Avoiding Detection with Shellcode Mutator"][432] - "BasicFUN Series": - ["Hardware Analysis / SPI Flash Extraction"][626] - ["Reverse Engineering Firmware / Reflashing SPI Flash"][627] - ["Dumping Parallel Flash via I2C I/O Expanders"][628] - ["I2C Sniffing, EEPROM Extraction and Parallel Flash Extraction"][629] - ["Basics for Binary Exploitation"][749] - ["Breaking Secure Boot on Google Nest Hub (2nd Gen) to run Ubuntu"][238] - ["BrokenPrint: A Netgear stack overflow"][782] - "Bypassing software update package encryption ": - ["Extracting the Lexmark MC3224i printer firmware"][190] - ["Exploiting the Lexmark MC3224i printer"][191] - ["Bypassing vtable Check in glibc File Structures"][208] - ["Blind Exploits to Rule Watchguard Firewalls"][173] - ["BPFDoor - An Evasive Linux Backdoor Technical Analysis"][292] - ["Canary in the Kernel Mine: Exploiting and Defending Against Same-Type Object Reuse"][917] - "Chrome Browser Exploitation": - [Part 1][1053] -Part 2][1054] - [Part 3][1055] - ["Competing in Pwn2Own 2021 Austin: Icarus at the Zenith"][556] - ["CoRJail: From Null Byte Overflow To Docker Escape Exploiting poll_list Objects In The Linux Kernel"][759] - ["Corrupting memory without memory corruption"][762] - ["Creating a Rootkit to Learn C"][719] - ["CVE-2022-0435: A Remote Stack Overflow in The Linux Kernel"][377] - ["[CVE-2022-1786] A Journey To The Dawn"][401] - ["CVE-2022-2602: DirtyCred File Exploitation applied on an io_uring UAF"][168] - ["CVE-2022-27666: Exploit esp6 modules in Linux kernel"][532] - ["CVE-2022-29582 An io_uring vulnerability"][495] - ["Deconstructing and Exploiting CVE-2020-6418"][778] - ["DirtyCred Remastered: how to turn an UAF into Privilege Escalation"][167] - ["Disclosing information with a side-channel in Django"][630] - ["Dumping the Amlogic A113X Bootrom"][78] - ["Dynamic analysis of firmware components in IoT devices"][250] - ["Embedded Systems Security and TrustZone"][145] - ["Emulate Until You Make it"][748] - ["EntryBleed: Breaking KASLR under KPTI with Prefetch (CVE-2022-4543)"][473] - ["Expanding the Dragon: Adding an ISA to Ghidra"][542] - ["Exploiting: Buffer overflow in Xiongmai DVRs"][742] - ["Exploiting CSN.1 Bugs in MediaTek Basebands"][272] - ["exploiting CVE-2019-2215"][61] - ["Exploiting CVE-2022-42703 - Bringing back the stack attack"][636] - ["Exploration of the Dirty Pipe Vulnerability (CVE-2022-0847)"][707] - ["Exploring the Hidden Attack Surface of OEM IoT Devices"][625] - ["Firmware key extraction by gaining EL3"][316] - ["Fortigate - Authentication Bypass Lead to Full Device Takeover"][291] - "Fourchain": - ["Prologue"][765] - ["Hole"][766] - ["Sandbox"][767] - ["Fuzzing ping(8) … and finding a 24 year old bug"][751] - "Hacking Bluetooth to Brew Coffee from Github Actions": - [Part 1][752] - [Part 2][753] - [Part 3][754] - ["Hackign More Secure Portable Storage Devices"][623] - ["How did I approach making linux LKM rootkit, “reveng_rtkit” ?"][884] - ["How The Tables Have Turned: An analysis of two new Linux vulnerabilities in nf_tables"][266] - ["Huawei Security Hypervisor Vulnerability"][435] - "Hunting for Persistence in Linux" - [Part 1][64] - [Part 2][65] - [Part 3][66] - [Part 4][67] - [Part 5][68] - "Hacking Some More Secure USB Flash Drives": - [Part 1][132] - [Part 2][133] - ["Learning eBPF exploitation"][768] - "Intro to Embedded RE": - ["Tools and Series"][351] - ["UART Discovery and Firmware Extraction via UBoot"][352] - "Introduction to x64 Linux Binary Exploitation": - [Part 1][663] - [Part 2][664] - [Part 3][665] - [Part 4][666] - [Part 5][667] - ["io_uring - new code, new bugs, and a new exploit technique"][978] - ["Linux Hardening Guide"][349] - ["Linux Kernel: Exploiting a Netfilter Use-after-Free in kmalloc-cg"][269] - ["Linux Kernel Exploit (CVE-2022–32250) with mqueue"][242] - "Linux SLUB Allocator Internals and Debugging": - [Part 1][359] - [Part 2][360] - [Part 3][361] - [Part 4][362] - ["Linternals: Introducing Memory Allocators & The Page Allocator"][516] - ["Linternals: The Slab Allocator"][517] - ["Linux kernel heap feng shui in 2022"][535] - ["Looking for Remote Code Execution bugs in the Linux kernel"][503] - ["Manipulating AES Traffic using a Chain of Proxies and Hardcoded Keys"][319] - ["MeshyJSON: A TP-Link tdpServer JSON Stack Overflow"][777] - ["Missing Manuals - io_uring worker pool"][265] - ["Modifying Embedded Filesystems in ARM Linux zImages"][775] - "Netgear Orbi": - ["orbi hunting 0x0: introduction, uart access, recon"][33] - ["orbi hunting 0x1: crashes in soap-api"][34] - ["nday exploit: netgear orbi unauthenticated command injection (cve-2020-27861)"][35] - ["nday exploit: libinput format string bug, canary leak exploit (cve-2022-1215)"][63] - ["NFC Relay Attack on Tesla Model Y"][574] - ["Nightmare: One Byte to ROP // Deep Dive Edition"][582] - ["Overview of GLIBC heap exploitation techniques"][239] - ["Parsing TFTP in Rust"][624] - ["Patching, Instrumenting & Debugging Linux Kernel Modules"][483] - ["PCIe DMA Attack against a secured Jetson Nano (CVE-2022-21819)"][649] - ["pipe_buffer arbitrary read write"][282] - "Pixel 6 Bootloader" - ["Booting up"][286] - ["Emulation, ROP"][287] - ["Exploitation"][288] - ["Port knocking from the scratch"][227] - ["Pulling MikroTik into the Limelight"][120] - ["Racing against the clock -- hitting a tiny kernel race window"][492] - ["Replicating CVEs with KLEE"][763] - ["Reversing C++, Qt based applications using Ghidra"][586] - ["Racing Cats to the Exit: A Boring Linux Kernel Use-After-Free"][406] - ["Replicant: Reproducing a Fault Injection "][675] - ["Researching Xiaomi’s Tee to Get to Chinese Money"][274] - "Reversing embedded device bootloader (U-Boot)": - [Part 1][162] - [Part 2][163] - ["Reverse Engineering a Cobalt Strike Dropper With Binary Ninja"][368] - ["Reverse engineering an EV charger"][606] - "Reverse Engineering Dark Souls 3": - ["Connection"][670] - ["Packets"][671] - ["Key Exchange"][672] - ["Reliable UDP"][673] - ["Reverse engineering integrity checks in Black Ops 3"][220] - ["Reverse engineering thermal printers"][245] - ["Reviving Exploits Against Cred Structs - Six Byte Cross Cache Overflow to Leakless Data-Oriented Kernel Pwnage"][491] - ["SETTLERS OF NETLINK: Exploiting a limited UAF in nf_tables (CVE-2022-32250)"][484] - ["Shedding Light on Huawei's Security Hypervisor"][434] - ["Shikitega - New stealthy malware targeting Linux"][438] - ["side channels: power analysis"][380] - ["side channels: using the chipwhisperer"][381] - ["SIM Hijacking"][579] - ["Spoofing Call Stacks To Confuse EDRs"][431] - ["SROP - ["Dumping the Flash"][117] - ["Digging Through the Firmware"][118] - ["Understanding and Hardening Linux Containers"][50] ## 2014 - ["ret2dir: Rethinking Kernel Isolation"][384] ## 2011 - ["Load-time relocation of shared libraries"][592] - ["Position Independent Code (PIC) in shared libraries"][593] ## 杂项 - [0xtriboulet][619] - ["A Noobs Guide to ARM Exploitation"][241] - ["Advanced binary fuzzing using AFL++-QEMU and libprotobuf: a practical case of grammar-aware in-memory persistent fuzzing"][71] - ["Advanced Compilers: The Self-Guided Online Course"][298] - ["Analysis of a LoadLibraryA Stack String Obfuscation Technique with Radare2 & x86dbg"][559] - ["Android Kernel Exploitation"][571] - [Anti-Debug Tricks][585] - ["ARM TrustZone: pivoting to the secure world"][304] - ["ARMv8 AArch64/ARM64 Full Beginner's Assembly Tutorial"][927] - [Awesome binary parsing][769] - [Awesome Executable Packing][717] - [Awesome Industrial Protocols][510] - ["Brute Ratel - Scandinavian Defence"][436] - [ComprehensiveRust][620] - [cryptopals][1022] - [CVE North Stars][708] - ["Debugger Ghidra Class"][232] - [DhavalKapil/heap-exploitation][363] - [Diffing Portal][378] - [exploit_mitigations][526] - ["fenrir"][1169] - [Ghidriff - Ghidra Binary Diffing Engine][490] - ["Grand Theft Auto A peek of BLE relay attack"][433] - ["Hands-on Firmware Extraction, Exploration, and Emulation"][979] - [ice9-bluetooth-sniffer][437] - "Illustrated Connections": - [dtls][519] - [quic][518] - [tls 1.2][521] - [tls 1.3][520] - "Introduction to encryption for embedded Linux" - ["Introduction to encryption for embedded Linux developers"][0] - ["A hands-on approach to symmetric-key encryption"][1] - ["Asymmetric-Key Encryption and Digital Signatures in Practice"][2] - ["Introduction to Malware Analysis and Reverse Engineering"][407] - ["Kernel Address Space Layout Derandomization"][529] - ["Kernel Exploit Recipes Notebook"][776] - ["Laser-Based Audio Injection on Voice-Controllable Systems"][328] - [Linux Kernel CVEs][385] - ["Linux kernel exploit development"][573] - ["Linux Kernel map"][225] - ["Linux Insides"][246] - ["Linux Privilege Escalation"][982] - ["Linux Syscalls Reference"][17] - ["Lytro Unlock - Making a bad camera slightly better"][373] - ["Minimizing Rust Binary Size"][476] - ["mjsxj09cm Recovering Firmware And Backdooring"][62] - ["Offensive security (0xtriboulet)"][405] - ["Operating System development tutorials in Rust on the Raspberry Pi"][357] - ["parking-game-fuzzer"][1159] - ["Practical Cryprography for Developers"][785] - [Red-Team-Infrastructure-Wiki][498] - ["Reverse Engineering For Everyone!"][399] - ["Reverse Engineering WiFi on RISC-V BL602"][617] - ["Rust Atomics and Locks"][651] - ["RustRedOps"][686] - ["Satellite Hacking Demystified(RTC0007)"][221] - [TEE Reversing][263] - ["THC's favourite Tips, Tricks & Hacks (Cheat Sheet)"][258] - [tmpout.sh][515]: 关于底层内容的文章合集 - ["Trail of Bits Testing Handbook"][724] - [TripleCross][696] - [USB-WiFi][329] - ["VSS: Beginners Guide to Building a Hardware Hacking Lab"][249] - ["WinDBG quick start tutorial"][485] ## 其他列表 * [漏洞利用](topics/exploitation.md): 专注于二进制漏洞利用领域的资源 * [Linux 内核](topics/linux_kernel.md): 专注于 Linux 内核 (内部机制) 的资源集合 * [无线通信](topics/wireless.md): 专注于无线技术和 安全性的资源 * [OT/IoT 安全](topics/ot_security.md) * [红队与攻击性安全](topics/red-team-adversary-emulation.md)
标签:0day挖掘, AI安全, Android安全, APT攻击, Awesome List, Chaos, Chat Copilot, Conpot, DAST, DLL 劫持, Fuzzing, iOS安全, IoT安全, PKINIT, Windows安全, Write-up, 二进制分析, 云安全运维, 云资产清单, 内核安全, 博客合集, 固件安全, 大语言模型, 安全渗透, 工控安全, 恶意软件分析, 情报收集, 技术文档, 攻防技术, 漏洞分析, 漏洞研究, 白皮书, 网络安全, 路径探测, 逆向工程, 防御加固, 隐私保护