Ajin Deepak (AD2001)inInfoSec Write-upsROP chains on ARM64This writeup focuses on using ROP chains to bypass NX in ARM64. We will be executing the system() function using ROP chains similar to…Jan 19, 2023Jan 19, 2023
Ajin Deepak (AD2001)inInfoSec Write-upsDouble free() attacks in ARM Part one.This is a detailed explanation for beginners on double-free attacks on ARM.Aug 28, 20221Aug 28, 20221
Ajin Deepak (AD2001)inInfoSec Write-upsArming the Use-After-Free()Hemlo Hackers, This is a short introduction to exploiting Use-After-Free vulnerabilities in the ARM platform.Jan 17, 2022Jan 17, 2022
Ajin Deepak (AD2001)inInfoSec Write-upsHeap Exploitation for Homo sapiens.This is a simple introduction to heap exploitation in the ARM platform for complete beginners. x86 nerds can also follow this.Dec 9, 2021Dec 9, 2021
Ajin Deepak (AD2001)inInfoSec Write-upsInvoking mprotect() using ROP Chains in ARMIn this article, we will make an ROP chain that invokes the mprotect() to bypass NX and make the stack executable again.Aug 21, 2021Aug 21, 2021
Ajin Deepak (AD2001)inInfoSec Write-upsInteger Overflows in ARMAn introduction to Integer Overflows in ARMAug 7, 2021Aug 7, 2021
Ajin Deepak (AD2001)inInfoSec Write-upsROP Chains on ARMHello, Lets take a look at ARM ROP Chains and Finding ROP GadgetsJul 18, 20211Jul 18, 20211