2026
Linux Kernel LPE via Page Cache Corruption

LPE dropped yesterday. They’re calling it Copy Fail. A logic bug in the kernel’s crypto subsys 732 bytes of Python, unprivileged, root on every major...

Out-of-Bounds Write in radare2 QNX Debug Client

Found an out-of-bounds write in radare2’s QNX remote debug protocol client. A malicious QNX debug server can send oversized responses that write past the caller’s...

Disassembly, Flux, and Runtime Hijinks

Today’s post we’re just raw-dogging it from a degenerate malware dev perspective. We’re gonna cook up a self-contained metamorphic engine a piece carrying its own...

2024
In-Memory Mach-O Execution on macOS

In-memory execution on macOS yes, it’s a thing. Sometime ago, I read a post by Patrick Wardle about one of the Lazarus Group implants using...

Reversing a D-Link NAS

Woke up today to find a juicy new Command Injection vulnerability hitting D-Link devices. While it’s no surprise to see vulnerabilities popping up every other...

DLL Proxying & Phantom Loads via VEH

In this post we’ll focus on the theory of a technique known as DLL Proxying, dive into offensive security tooling developing & techniques leveraging Rust....

2023
Malware Development Essentials for Operators

Today’s post is a full pipeline walkthrough from a MessageBoxA call all the way to a kernel rootkit doing DKOM process hiding and callback abuse....

Exploit Development Essentials

Today’s post we’re gonna walk through exploit development on x86-64 Linux from the ground up. We’ll start with a basic stack overflow, write shellcode, pop...

2022
The Art of Self-Mutating Malware

In the beginning, there was the signature. A simple string of bytes that uniquely identified a piece of malware. Those were simpler times - append...

2021
Writing a Simple Linux Rootkit

This one builds on the kernel modules post. If you haven’t read that, go read it first because I’m not explaining what module_init does again....

The Linux Kernel Modules Programming

Kernel modules are pieces of code that get loaded into the kernel at runtime no reboot, no recompilation. They run in ring0, same privilege level...

elsewhere

archived in vx-underground papers collection

cited in UK NCSC CTO

cross-posted on 0x00sec forum

source on github