Heap Feng Shui: Controlling the Windows Low Fragmentation Heap

A deep dive into LFH internals, bucket allocation strategies, and practical techniques for deterministic heap layout manipulation during exploit development.

WinDbg Survival Guide for EXP-401 Students

Essential WinDbg commands, extensions, and workflows every OSEE candidate should have burned into muscle memory before sitting the 72-hour exam.

Return-Oriented Programming in 2025: What Still Works

A practical assessment of ROP chain construction against modern Windows mitigations including CFG, CET, and ACG. Where do we stand?

Setting Up a Vuln Research Lab: From Bare Metal to First Crash

A complete walkthrough of building an isolated vulnerability research environment with VMware, snapshot management, and integrated debugging.

Use-After-Free Exploitation: From Dangling Pointer to Code Execution

Walking through the full lifecycle of a UaF vulnerability — root cause analysis, heap grooming, object reclamation, and achieving reliable code execution.