Browser Exploitation Foundations
JavaScript Engines, V8 Internals, Object Representation, JIT Compilation, Garbage Collection, Sandbox Architecture, and the Path to RCE
Exploitation, reverse engineering, and low-level internals. From userland to Ring -1.
JavaScript Engines, V8 Internals, Object Representation, JIT Compilation, Garbage Collection, Sandbox Architecture, and the Path to RCE
Every Named Heap Exploitation Technique, Explained and Exploited
Understanding glibc Internals, Use-After-Free, Tcache Poisoning, Double Free, and Heap Overflow Techniques on x86-64 Linux
Understanding, Finding, and Exploiting Stack Buffer Overflows on x86-64 Linux
The foundational course for everything else on this platform. Covers the Windows kernel architecture byte by byte. Protection rings, security tokens, EPROCESS internals, system call mechanics, the kernel attack surface, and privilege escalation techniques.
CPU Architecture, Registers, Virtual Memory, Process Layout, The Stack, The Heap, Calling Conventions, and Memory Protections
Filter Bypass, CSP Evasion, Mutation XSS, Blind XSS, Prototype Pollution, DOM Clobbering, postMessage Exploitation, and Weaponised Payloads
HTML/JS Context, Reflected, Stored, and DOM-Based XSS, Browser Parsing, Cookie Theft, and Defense Mechanisms
In-Band, Blind, Out-of-Band, Error-Based, Time-Based, Union-Based, Second-Order, and WAF Bypass Techniques
Breaking Single-Byte and Repeating-Key XOR, Stream Cipher Attacks, Nonce Reuse Exploitation, and One-Time Pad Theory
The Big Picture : Vocabulary, Concepts, and Building Blocks
Client-Server Architecture, DNS, Cookies, Sessions, Tokens, SOP, CORS, and the Browser Security Model
Understanding HTTP, Requests, Headers, and Mechanics of the Web