Reverse engineering challenge involving a stack based VM.
Babyheap - DEF CON CTF Qualifier 2019
Single byte overflow that leads to larger overflow and tcache poisoning on the DEFCON 2019 qualifiers hosted by the Order of the Overflow.
Linux Kernel Exploit development - Environment
The idea of this post is to set up an environment to play with the Linux kernel.