# About
# Archive
# Android Deserialization Deep Dive
# Android Deep Dive - Deep and App Linking
# Android Deep Dive - Implicit Intents
# Not All Roads Lead to PWN2OWN - CGI Fuzzing, AFL and ASAN (Part 3)
# Not All Roads Lead to PWN2OWN - Firmware Reverse Engineering (Part 2)
# Not All Roads Lead to PWN2OWN - Hardware Hacking (Part 1)
# Exploiting a Quarantine UAF Mitigation on a Custom Allocator Challenge
# A Reverse Engineering Journey Walkthrough
# DirtyCred File Exploitation applied on an io_uring UAF - CVE-2022-2602
# Linux Kernel n-day exploit development (CVE-2020-27786)
# Hunting for Linux Kernel public vulnerabilities
# KRWX - Kernel Read Write Execute
# Android Internals IPC - Binder and Service Manager Perspective
# Android Internals IPC - Introduction
# Owncloud Multiple Vulnerabilities (CSRF, SSRF and Information Leak)
# Moodle Server-Side Request Forgery (SSRF)
# TIM Mobile Phone Geolocalization
# Rusty Joomla Remote Code Execution
# How To Write FUD Malware (Thesis)
This, the thrill of pwning a system, this is the greatest rush.