👾 @kiks

Search

Search IconIcon to open search

# About

# Archive

# Android Deserialization Deep Dive

# Android Deep Dive - Deep and App Linking

# Android Deep Dive - Implicit Intents

# Not All Roads Lead to PWN2OWN - CGI Fuzzing, AFL and ASAN (Part 3)

# Not All Roads Lead to PWN2OWN - Firmware Reverse Engineering (Part 2)

# Not All Roads Lead to PWN2OWN - Hardware Hacking (Part 1)

# Exploiting a Quarantine UAF Mitigation on a Custom Allocator Challenge

# A Reverse Engineering Journey Walkthrough

# DirtyCred File Exploitation applied on an io_uring UAF - CVE-2022-2602

# Linux Kernel n-day exploit development (CVE-2020-27786)

# Hunting for Linux Kernel public vulnerabilities

# KRWX - Kernel Read Write Execute

# Android Internals IPC - Binder and Service Manager Perspective

# Android Internals IPC - Introduction

# Owncloud Multiple Vulnerabilities (CSRF, SSRF and Information Leak)

# Moodle Server-Side Request Forgery (SSRF)

# TIM Mobile Phone Geolocalization

# Rusty Joomla Remote Code Execution

# How To Write FUD Malware (Thesis)


This, the thrill of pwning a system, this is the greatest rush.