writeups.xyz writeups.xyz / Reverse Engineering

Title Vulnerabilities Programs Authors
Breaking Down Barriers: Exploiting Pre-Auth SQL Injection In WhatsUp Gold - CVE-2024-6670
Firmware Security: Alcatel-Lucent ALE-DeskPhone
CVE-2024-27822: macOS PackageKit Privilege Escalation
Exploiting American Conquest
CVE-2024-1212: Unauthenticated Command Injection In Progress Kemp LoadMaster
TP-Link TDDP Buffer Overflow Vulnerability
Exploiting embedded mitel phones for unauthenticated remote code execution
Hacking a Smart Home Device
Hunting for Unauthenticated n-days in Asus Routers
Exploring Counter-strike: Global Offensive Attack Surface
Analyzing the SonicWall Custom Grub LUKS Encryption Modifications
Achieving Remote Code Execution in Steam: a journey into the Remote Play protocol
The Nightmare of Apple's OTA Update: Bypassing the Signature Verification and Pwning the Kernel
Hacking a Tapo TC60 Camera
Shambles: The Next-Generation IoT Reverse Engineering Tool to Discover 0-Day Vulnerabilities
CVE-2023-33298 - Perimeter81 Local Privilege Escalation
Reversing Citrix Gateway for XSS
Reverse Engineering Coin Hunt World’s Binary Protocol
Hacking my “smart” toothbrush
‘FriendlyName’ Buffer Overflow Vulnerability in Wemo Smart Plug V2
Compromising Garmin’s Sport Watches: A Deep Dive into GarminOS and its MonkeyC Virtual Machine
Impersonating Other Players with UDP Spoofing in Mirror
Reversing UK mobile rail tickets
Reverse Engineering the Apple Multipeer Connectivity Framework
Pentest-Story: Empirum password decryption