shxdow's notebook
- 
      Analysis of CVE-2023-32439: a Type Confusion BugOct 12, 2023
 JSC's JIT Incorrect CSE for EnumeratorUpadteNextIndexAndMode
- 
      Exploitation of CVE-2020-9802: a JavaScriptCore JIT BugNov 13, 2022
 JSC's JIT Incorrect Common Subexpression Elimination for ArithNegate
- 
      Google NUL Poison attackSep 15, 2022
 Notes on exploitation techniques in Gnu C Library
- 
      CVE-2018-1160: Netatalk RCEJul 15, 2022
 Exploitation of an Apple Filing Protocol Server
- 
      PicoCTF Horsepower - V8 exploitationJul 13, 2022
 Solution to a V8 exploitation challenge
- 
      On logic, formal verification and decision procedures - Part IIMar 28, 2022
 Introduction to first order logic
- 
      Inchworm theoryJul 16, 2021
 On learning, improvement and performance
- 
      On logic, formal verification and decision procedures - Part IJan 17, 2021
 Introduction to propositional logic
- 
      StartJan 16, 2021
 Grappling with procrastination
- 
      Analysis of WirenetJul 4, 2017
 Reverse engineering a cross-platform banking trojan
- 
      Kernel notesApr 20, 2016
 Notes on OS internals, kernels and ...