Heap Exploitation For Dummies (Part 1)

Original by Magnus on the forum. Most beginners get lost when it comes to exploiting the heap. That’s because there are a lot of techniques that differ depending on the glibc version and other variables, making them want to throw their computer in the trash. But it’s not really that complicated.

Crypto / Reverse Challenge

Keeping the old 0x00sec tradition alive, 0x00pico has dropped a new crypto / reverse challenge. It's a Linux x86_64 binary and the goal is straightforward: recover the password and get access.

BYOVD: Silencing AV/EDR with CVE-2023-52271

Bring Your Own Vulnerable Device (BYOVD) is a technique used in red teaming that allows users to perform kernel-level actions by exploiting a vulnerable, legitimately signed kernel device driver. Drivers run in ring