Explore >> Select a destination


You are here

hernan.de
| | klecko.github.io
4.6 parsecs away

Travel
| | This post aims at giving an overview of what SELinux is, how it is implemented, and how to bypass it, from the point of view of Android kernel exploitation.
| | blog.lizzie.io
3.5 parsecs away

Travel
| |
| | reverse.put.as
1.5 parsecs away

Travel
| | This is a guest post by a young and talented Portuguese exploiter, Federico Bento. He won this year's Pwnie for Epic Achievement exploiting TIOCSTI ioctl. Days ago he posted a video demonstrating an exploit for CVE-2017-5123 and luckly for you I managed to convince him to do a write-up about it. I hope you enjoy his work. Thanks Federico!
| | mem2019.github.io
42.2 parsecs away

Travel
| Last weekend we played Google CTF and I have solved 2 challenges: first 2 parts of fullchain and eBPF. The fullchain challenge is actually very easy: v8 bug ...