Technical Blog Reverse engineering, exploitation and breaking tech. Latest Posts Exploiting the Synology TC500 at Pwn2Own Ireland 2024 August 1, 2025 Exploiting the Lorex 2K Indoor Wifi at Pwn2Own Ireland December 9, 2024 Empowering Women in Cybersecurity: InfoSect’s 2024 Training Initiative November 16, 2023 C++ Memory Corruption (std::string) – part 4 March 27, 2022 C++ Memory Corruption (std::list) – part 3 March 14, 2022 InfoSect announces HackerChix edition – training opportunities for women March 3, 2022 C++ Memory Corruption (std::vector) – part 2 January 3, 2022 InfoSect Training Demographics for 2021 January 2, 2022 Sudoedit heap overflow February 12, 2021 C++ Memory Corruption – part 1 August 26, 2020 Double Frees in Chrome’s Partition Alloc – part 2 May 11, 2020 Bit Flipping Attacks Against Free List Pointer Obfuscation April 15, 2020 An Analysis of Linux Kernel Heap Hardening April 13, 2020 Bypassing Pointer Guard in Linux’s glibc April 12, 2020 Breaking Secure Checksums in the Scudo Allocator April 9, 2020 InfoSect Coronavirus (COVID-19) Announcement March 18, 2020 Heap Exploitation in Chrome’s PartitionAlloc – part 1 March 11, 2020 Weaknesses in Linux Kernel Heap Hardening March 2, 2020 Linux Kernel Stack Smashing February 24, 2020 Pointer Compression in V8 February 2, 2020 Categories Business (4) Code Review (67) Embedded (11) Exploitation (37) Heap Exploitation (28) Linux (76) Linux Kernel (7) Pwn2Own (2) Reverse Engineering (1) Training (3) Uncategorized (3) Women In Security (2) Archives Archives Select Month August 2025 (1) December 2024 (1) November 2023 (1) March 2022 (3) January 2022 (2) February 2021 (1) August 2020 (1) May 2020 (1) April 2020 (4) March 2020 (3) February 2020 (2) January 2020 (1) December 2019 (3) November 2019 (6) September 2019 (6) August 2019 (6) July 2019 (2) March 2019 (7) November 2018 (2) September 2018 (1) July 2018 (6) June 2018 (2) May 2018 (2) March 2018 (12) February 2018 (34) January 2018 (1)