• 22. 2021, June 19 - Statelessness - Rootcause of many Security Vulnerabilities
  • 21. 2021, May 09 - Sigreturn Oriented Programming - An Introduction
  • 20. 2021, March 19 - Writing simple LLVM Passes
  • 19. 2021, March 10 - Understanding clang's SafeStack
  • 18. 2019, November 10 - Understanding the Loader - Part1 - How does an executable get loaded to memory?
  • 17. 2019, March 30 - Return Oriented Programming - Part2
  • 16. 2019, March 06 - Defeating Write XOR Execute! - Ret2Libc - Part2
  • 15. 2019, March 04 - Bypassing Write XOR Execute! - Ret2Libc - Part1
  • 14. 2019, January 16 - Return Oriented Programming - Part1
  • 13. 2018, December 28 - How does the Operating System defend itself?
  • 12. 2018, December 08 - Buffer Overflow Vulnerability - Part3
  • 11. 2018, December 07 - Exploitation using Code Injection - Part3
  • 10. 2018, December 02 - Exploitation using Code Injection - Part2
  • 9. 2018, October 20 - Exploitation using Code Injection - Part1
  • 8. 2018, October 08 - Buffer Overflow Vulnerability - Part2
  • 7. 2018, October 02 - Buffer Overflow Vulnerability - Part1
  • 6. 2018, September 22 - Program Execution Internals - Part2
  • 5. 2018, September 10 - Program Execution Internals - Part1
  • 4. 2018, August 18 - Memory Layout of a Process
  • 3. 2018, August 12 - Introduction to x86 Assembly Programming
  • 2. 2018, July 02 - What does an Executable contain? - Internal Structure of an ELF Executable - Part1
  • 1. 2018, June 21 - Internals of Compiling - Journey from C/C++ program to an Executable