Recent
Ghidra Python3 Scripting Cheatsheet
·2 mins
Research
Reverse-Engineering
Ghidra
Notes on writing python3 scripts for Ghidra.
Security assessment of a commercial router using physical access: a case study
·1 min
IoT
Internet of Things
Router Security
Trusted Computing
Physical access to a device can greatly help in vulnerability research as it opens up new vectors for exploitation.
[NorthSec CTF 2023] - Desk Surveillance Publisher
·10 mins
CTF Writeups
ROP
Autopwn
Angr
Cameras are down. Not the endpoint installing their firmwares. Open socket here. Could analyze some outdated firmwares.
[RITSEC CTF 2023] - Steg as a Service
·10 mins
CTF Writeups
ROP
BinDiff
Can you try exploiting our shady copy of steghide so that we can convince our managers to update the binary?
Deep dive into FSOP
·16 mins
Research
FSOP
Angr
File Stream Oriented Programming (FSOP) is a binary exploitation technique that uses GLIBC file stream structures to gain code execution from memory corruption.