Publications

Sig-return Oriented Programming

In this article I went through the technique of sig-return oriented programming which can be used to exploit buffer overflow attacks …

anti-RE for fun

In this article we went through a lot of different techniques that can be used to obfuscate a binary so that an attacker cannot easily …