shxdow's notebook
Analysis of CVE-2023-32439: a Type Confusion Bug
JSC's JIT Incorrect CSE for EnumeratorUpadteNextIndexAndModeExploitation of CVE-2020-9802: a JavaScriptCore JIT Bug
JSC's JIT Incorrect Common Subexpression Elimination for ArithNegateGoogle NUL Poison attack
Notes on exploitation techniques in Gnu C LibraryCVE-2018-1160: Netatalk RCE
Exploitation of an Apple Filing Protocol ServerPicoCTF Horsepower - V8 exploitation
Solution to a V8 exploitation challengeOn logic, formal verification and decision procedures - Part II
Introduction to first order logicInchworm theory
On learning, improvement and performanceOn logic, formal verification and decision procedures - Part I
Introduction to propositional logicStart
Grappling with procrastinationAnalysis of Wirenet
Reverse engineering a cross-platform banking trojanKernel notes
Notes on OS internals, kernels and ...