binary exploitation 25
- VL Shinra Part 4 - Reverse Engineering, Binary Exploitation & Ansible
- Real World CTF 2023 – NonHeavyFTP
- Ekoparty 2022 BFS Windows Challenge
- Windows Kernel Exploitation - Arbitrary Memory Mapping (x64)
- Browser Exploitation: Firefox OOB to RCE
- Windows Kernel Exploitation - HEVD x64 Use-After-Free
- Windows Kernel Exploitation - HEVD x64 Type Confusion
- Windows Kernel Exploitation - HEVD x64 Stack Overflow
- Windows Kernel Exploitation - VM Setup
- Bypassing DEP with VirtualProtect (x86)
- Bypassing DEP with WriteProcessMemory (x86)
- Lab - Rainbow Walkthrough
- SEH Based Buffer Overflow with Space Limitations - Kevin @ PG Practice
- SEH Based Buffer Overflow & DLL Hijacking - UT99 @ PG Practice
- Vim RCE & OpenBSD Binary Exploitation - Attended @ HackTheBox
- Player2 @ HackTheBox
- Rope @ HackTheBox
- Patents @ HackTheBox
- Bankrobber @ HackTheBox
- Dream Diary 3 @ HackTheBox
- Safe @ HackTheBox
- Release: Ropstar
- Ellingson @ HackTheBox
- RedCross @ HackTheBox
- Frolic @ HackTheBox