Feed
Fusion level 07 - (Un)serious reverse engineering
custom instruction sets, Reversing encryption algorithms, and then some dlopen() FUN!
Fusion level 06 - Multithreaded fun
Multithreaded stack overrun, information leaks, and other lessons on why you should lock shared data
Fusion level 05 - barely bypassing PIE
predicting file descriptors, creating format string from buffer overflow, and then some
phoenix heap 3 - classic heap unlink attack
exploiting the infamous doug lea heap implementation, classic unlink!
phoenix stack 5 - stack buffer overflow
a brief write-up (and exploit) on why you should read the ***** manual
phoenix final 1 - blind format string
can you do a format string attack even if you cannot see the leak? let's see