Posts
2026
-
Forrester Research Note - Mythos 10 Consequences - Finance Translation
2022
-
Revisiting Pegasus on iOS9
2018
-
Source Level Debugging the XNU Kernel
-
Autogenerating defaults(1) Commands
-
Defaults Non-obvious Locations
-
Advanced defaults(1) Usage
2015
-
Broken, Abandoned, and Forgotten Code, Part 14
-
Broken, Abandoned, and Forgotten Code, Part 13
-
Broken, Abandoned, and Forgotten Code, Part 12
-
Broken, Abandoned, and Forgotten Code, Part 11
-
Broken, Abandoned, and Forgotten Code, Part 10
-
Broken, Abandoned, and Forgotten Code, Part 9
-
Broken, Abandoned, and Forgotten Code, Part 8
-
Broken, Abandoned, and Forgotten Code, Intermission
-
Broken, Abandoned, and Forgotten Code, Part 7
-
Broken, Abandoned, and Forgotten Code, Part 6
-
Broken, Abandoned, and Forgotten Code, Part 5
-
Broken, Abandoned, and Forgotten Code, Part 4
-
Broken, Abandoned, and Forgotten Code, Part 3
-
Broken, Abandoned, and Forgotten Code, Part 2
-
Broken, Abandoned, and Forgotten Code, Part 1
-
Broken, Abandoned, and Forgotten Code: Prologue
-
Bowcaster Feature: multipart/form-data
-
Patching, Emulating, and Debugging a Netgear Embedded Web Server
-
Remote Debugging with QEMU and IDA Pro
2014
-
Exploit Tunneling and Callback
-
Infiltrate 2014
2013
-
Emulating and Debugging Workspace
-
BayThreat 2013 Presentation - Additional Resources
-
Netgear Root Compromise via Command Injection
-
Complete, Persistent Compromise of Netgear Wireless Routers
-
A Connect-back HTTP Exploit Server for Bowcaster
-
44CON Presentation - Additional Resources
-
Insulting Recruiter Emails
-
Running Debian MIPS Linux in QEMU
-
Is your Mac's File System Protected?
-
Bowcaster's EmptyOverflowBuffer class (Tutorial Part 5)
-
Buffer Overflows with Bowcaster Part 4
-
Crossbow is now Bowcaster
-
Buffer Overflows with Bowcaster Part 3
-
Buffer Overflows with Bowcaster Part 2
-
Buffer Overflows with Bowcaster Part 1
-
Crossbow
-
Hacking is Bullshit
-
DLink DIR-815 UPnP Command Injection
2012
-
UPDATED: Responsible (non)Disclosure
-
Specifying Preferred Load Addresses for ELF Shared Libraries
-
Parsing Email and Fixing Timestamps in Python
2011
-
Long-form Reading 2011
-
Reading List 2011
2009
-
Handling HTTP Redirection in Ruby
-
Mounting LVM Disks in Ubuntu
-
How to sudoedit non-interactively
2004
-
The Shadow File