Explore >> Select a destination


You are here

xcellerator.github.io
| | blog.osandov.com
2.2 parsecs away

Travel
| | I just landed a really exciting feature for drgn: the ability to call arbitrary functions and write to memory in the Linux kernel. I think the technical details of the implementation are very interesting, and it's probably the funniest thing I've ever done, so I wanted to write about how it works.
| | reverse.put.as
3.9 parsecs away

Travel
| | This is a guest post by a young and talented Portuguese exploiter, Federico Bento. He won this year's Pwnie for Epic Achievement exploiting TIOCSTI ioctl. Days ago he posted a video demonstrating an exploit for CVE-2017-5123 and luckly for you I managed to convince him to do a write-up about it. I hope you enjoy his work. Thanks Federico!
| | pwning.systems
3.4 parsecs away

Travel
| | I'm writing this post because I often hear that kernel exploitation is intimidating or difficult to learn. As a result, I've decided to start a series of basic bugs and exercises to get you started! Prerequisites Knowledge of the Linux command line Knowing how to read and write basic C may be beneficial Being able to debug with the help of a virtual computer or another system Able to install the kernel module compilation build requirements A basic understanding of the difference between userland and kern...
| | egghead.io
9.4 parsecs away

Travel
| You're going to run into a lot of frustration writing Node CLI's unless you get good at debugging. (Even if you use TypeScript!) To understand code exec...