Ajin Deepak (AD2001)inInfoSec Write-upsROP chains on ARM64This writeup focuses on using ROP chains to bypass NX in ARM64. We will be executing the system() function using ROP chains similar to…11 min read·Jan 19, 2023----
Ajin Deepak (AD2001)inInfoSec Write-upsDouble free() attacks in ARM Part one.This is a detailed explanation for beginners on double-free attacks on ARM.13 min read·Aug 28, 2022--1--1
Ajin Deepak (AD2001)inInfoSec Write-upsArming the Use-After-Free()Hemlo Hackers, This is a short introduction to exploiting Use-After-Free vulnerabilities in the ARM platform.14 min read·Jan 17, 2022----
Ajin Deepak (AD2001)inInfoSec Write-upsHeap Exploitation for Homo sapiens.This is a simple introduction to heap exploitation in the ARM platform for complete beginners. x86 nerds can also follow this.13 min read·Dec 9, 2021----
Ajin Deepak (AD2001)inInfoSec Write-upsInvoking mprotect() using ROP Chains in ARMIn this article, we will make an ROP chain that invokes the mprotect() to bypass NX and make the stack executable again.18 min read·Aug 21, 2021----
Ajin Deepak (AD2001)inInfoSec Write-upsInteger Overflows in ARMAn introduction to Integer Overflows in ARM11 min read·Aug 7, 2021----
Ajin Deepak (AD2001)inInfoSec Write-upsROP Chains on ARMHello, Lets take a look at ARM ROP Chains and Finding ROP Gadgets25 min read·Jul 18, 2021--1--1