0xshlomil

0xshlomil's cyber blog

Home Search About Archive

Categories

Software Exploitation

CVE-2019-0539: Remote Code Execution

CVE-2019-0539: Root Cause Analysis

CVE-2015-5122: Exploitation Using COOP

An Overview of the History of Software Exploitation Techniques & Modern Defenses

CVE-2016-0728: Root Cause Analysis and Exploitation of a Linux Kernel Vulnerability

CVE-2015-0359: Root Cause Analysis

CVE-2015-0359

CVE-2015-0359: Root Cause Analysis

Flash

CVE-2015-0359: Root Cause Analysis

CVE-2016-0728

CVE-2016-0728: Root Cause Analysis and Exploitation of a Linux Kernel Vulnerability

Linux Kernel

CVE-2016-0728: Root Cause Analysis and Exploitation of a Linux Kernel Vulnerability

Miscellaneous

An Overview of the History of Software Exploitation Techniques & Modern Defenses

The Gödel Proof & the Malware-Detection Spoof

History

An Overview of the History of Software Exploitation Techniques & Modern Defenses

The Gödel Proof & the Malware-Detection Spoof

Godel

The Gödel Proof & the Malware-Detection Spoof

Philosophy

The Gödel Proof & the Malware-Detection Spoof

COOP

CVE-2015-5122: Exploitation Using COOP

CVE-2019-0539

CVE-2019-0539: Remote Code Execution

CVE-2019-0539: Root Cause Analysis

Edge

CVE-2019-0539: Remote Code Execution

CVE-2019-0539: Root Cause Analysis

Chakra

CVE-2019-0539: Remote Code Execution

CVE-2019-0539: Root Cause Analysis

Reverse Engineering

Introducing ida-free-mcp

IDA

Introducing ida-free-mcp

MCP

Introducing ida-free-mcp

AI

Introducing ida-free-mcp