Posts/* Sections */2026-05-09Linux-Security2025-01-21CTF-PWN2025-01-14Reverse Engineering2024-01-16Windows Security2021-09-22Web Security2026May 9Deep Dive into Copy Fail: Root Cause, Exploitation, and Detection of a Linux Page Cache Vulnerability2025Jan 21largebin attackJan 16unsortedbin attackJan 14Typora 1.9.5 CrackingJan 8Overwriting _IO_2_1_stdout to Leak libc AddressJan 7Security Flags and Seccomp SandboxJan 7ret2csuJan 7Inequable_CanaryJan 7asadstoryJan 6glibc all in oneJan 6ezheap2Jan 5glibc malloc/free Source Code Analysis2024Dec 20Installing pwntools on MacDec 7GDB CheatsheetJan 16Research on Triggers and Actions Data Structures of Scheduled Tasks in the Registry2023Oct 25Deletion of Arbitrary File into Escalation of Privilege2022Nov 4Windows Common Persistence Backdoor Hunting2021Oct 29Hell's GateSep 22Hijacking Resin Request/Response via Filter InjectionJul 23CVE-2021-36934 Windows 10 Local Privilege EscalationJun 29CVE-2021-40449 win32kfull!GreResetDCInternal UAF VulnerabilityJun 29CVE-2021-1732 Windows 10 Local Privilege Escalation VulnerabilityJun 18HMValidateHandle TechniqueJan 11Deep Dive into Windows Scheduled Tasks and Malicious Hiding Techniques2019Oct 16From Shellcode to Buffer Overflow: A Practical GuideJul 26Representation of Basic Data Types in C++Jul 15Unpacking Record: Nine-Layered Demonic Tower