TLDR I was unable to find some good writeups/blogposts on Windows user mode heap exploitation which inspired me to write an introductory but practical post on Windows heap internals and exploitati| mrT4ntr4's Blog
---| mrT4ntr4's Blog
--- This is the second part on the VirtualGuard Protector series which focuses on the virtualizat| mrT4ntr4's Blog
--- This part focuses more on the basic obfuscation techniques used in .Net samples such as Contr| mrT4ntr4's Blog
So recently a challenge(| mrT4ntr4's Blog
FC| mrT4ntr4's Blog
I had so| mrT4ntr4's Blog
| mrT4ntr4's Blog
| mrT4ntr4's Blog
| mrT4ntr4's Blog
| mrT4ntr4's Blog
| mrT4ntr4's Blog
| mrT4ntr4's Blog
| mrT4ntr4's Blog
| mrT4ntr4's Blog
| mrT4ntr4's Blog
| mrT4ntr4's Blog
| mrT4ntr4's Blog
| mrT4ntr4's Blog
| mrT4ntr4's Blog
So recently a challenge(Layers) from 3kCTF featured control flow flattening using OLLVM. Although I did know about control flow flattening I hadn’t encountered it personally. And as I’ve been experime| mrT4ntr4's Blog