HackOvert
Helping build current and future generations of hackers.
[002] RE Sessions - Steering the Ship
[001] RE Sessions - Angry Robot
Bug hunting using the "Portnoy Process"
[AntiDBG] FindWindow
Powering up your source code auditing with parsers
[AntiDBG] NtQueryInformationProcess
[AntiDBG] CheckRemoteDebuggerPresent
[AntiDBG] NtGlobalFlag
Source Code Auditing
A journey into anti-debugging
Hunting Format String Vulnerabilities
The Boolean Satisfiability Problem and Satisfiability Modulo Theories (SAT / SMT)
[QuikHax:3] Creating a planar disk cookie sheet antenna for your RTL-SDR
Modeling functions with Z3
File Format Reverse Engineering 3 - Templating with 010
File Format Reverse Engineering 4 - Digging deeper
File Format Reverse Engineering 2 - Identifying files of interest
File Format Reverse Engineering 1- Intro, target, and tools
Auditing system calls for command injection vulnerabilities using Binary Ninja's HLIL
Auditing system calls for command injection vulnerabilities using Ghidra's PCode