Tips on how to create and properly configure/test an intentionally vulnerable VM, also known as boot2roots.

This post discusses what an arbitrary overwrite (or write-what-where) vulnerability is and how it can be exploited.

Null page dereference vulnerabilities, what they are, how to exploit them and how they're mitigated.

Part 5 discusses a common vulnerability class called integer overflow.

Building up on part 3, this post shows how exploitation is done on a Windows 10 machine with SMEP enabled.

Demonstrates the exploit development phases of a stack buffer overflow in kernel on Windows 7 x86 and x64

Discusses payloads to be used in upcoming posts

Discusses configuring the target VMs, loading the vulnerable driver and configuring WinDBG.

Writeup for Don't net, kids!

Writeup for Buggy Bot!