-
Towards utilizing BTF Information in Linux Memory Forensics
-
BPF Memory Forensics with Volatility 3
-
Solving Binary Gecko's Hexacon CTF with frida and angr [stage 1, Linux]
-
Linux S1E3: With IP Control or Arbitrary Read-Write to Root
-
Linux S1E2: From UAF in km32 to IP Control or Arbitrary Read-Write
-
Linux S1E1: From Off-by-Null to Kernel Pointer Leaks
-
LSMs Jmp'ing on BPF Trampolines
-
ret2dlresolve: Exploiting with the Dynamic Linker