shxdow's notebook
-
Analysis of CVE-2023-32439: a Type Confusion Bug
Oct 12, 2023
JSC's JIT Incorrect CSE for EnumeratorUpadteNextIndexAndMode -
Exploitation of CVE-2020-9802: a JavaScriptCore JIT Bug
Nov 13, 2022
JSC's JIT Incorrect Common Subexpression Elimination for ArithNegate -
Google NUL Poison attack
Sep 15, 2022
Notes on exploitation techniques in Gnu C Library -
CVE-2018-1160: Netatalk RCE
Jul 15, 2022
Exploitation of an Apple Filing Protocol Server -
PicoCTF Horsepower - V8 exploitation
Jul 13, 2022
Solution to a V8 exploitation challenge -
On logic, formal verification and decision procedures - Part II
Mar 28, 2022
Introduction to first order logic -
Inchworm theory
Jul 16, 2021
On learning, improvement and performance -
On logic, formal verification and decision procedures - Part I
Jan 17, 2021
Introduction to propositional logic -
Start
Jan 16, 2021
Grappling with procrastination -
Analysis of Wirenet
Jul 4, 2017
Reverse engineering a cross-platform banking trojan -
Kernel notes
Apr 20, 2016
Notes on OS internals, kernels and ...