A Fool’s Grimoiresome computer user attempts things |
Version | v1.0.0 | |
---|---|---|---|
Updated | |||
Author | Seb | Home |
This section links to explorations made into various topics.
This series of posts goes through a small breadth-first foray into software performance measurement tooling and techniques. It also investigates some parallelisation techniques, such as GPU programming.
The main goal of this series was to become more familiar with various performance related technologies and techniques.
This section contains collections of resources for various topics. Surely it will be expanded over time.
This section holds older posts/goings on from a few years ago. Some have their own pages, others are just a small description here.
Beginner binary exploitation writeup of a few challenges, done as part of picoCTF.
A small dive into glibc FILE exploitation.
A CTF writeup from tghack 2020.
This is a writeup of a Chrome v8 exploitation challenge from DownUnderCTF.
Code for a rootkit made as a learning exercise early on in my security learning adventure as part of a University course.
Code for a
black box fuzzer made in a team as part of a University project. I
worked on the harness component of this fuzzer, which managed the binary
that was being tested (setting it up, feeding it inputs, managing
crashes). Some additional features I worked on include a simple code
coverage mechanism using ptrace()
and a memory snapshot
mechanism to improve fuzzer performance.
When looking at the Janet programming
language, I discovered a few memory corruption bugs in the project
(issues #416, #409, #407) by
fuzz testing, and further dynamic analysis using gdb
to
pinpoint the cause of the bugs.
The theme was adapted from Oskar Wickström’s design, with code at github.com/owickstrom/the-monospace-web.