Heap Feng Shui: Controlling the Windows Low Fragmentation Heap
A deep dive into LFH internals, bucket allocation strategies, and practical techniques for deterministic heap layout manipulation during exploit development.
Technical writeups, exploit development journals, vulnerability analysis, and perspectives from the offensive security trenches.
A deep dive into LFH internals, bucket allocation strategies, and practical techniques for deterministic heap layout manipulation during exploit development.
Essential WinDbg commands, extensions, and workflows every OSEE candidate should have burned into muscle memory before sitting the 72-hour exam.
A practical assessment of ROP chain construction against modern Windows mitigations including CFG, CET, and ACG. Where do we stand?
A complete walkthrough of building an isolated vulnerability research environment with VMware, snapshot management, and integrated debugging.
Walking through the full lifecycle of a UaF vulnerability — root cause analysis, heap grooming, object reclamation, and achieving reliable code execution.