René's URL Explorer Experiment


Title: ρ

Description: At OffensiveCon 2018 I presented my already a bit dated ASM.JS JIT-Spray research. You can find more information in previous blogposts. Besides using …

direct link

Domain: rh0dev.github.io

authorRh0
HandheldFriendlyTrue
MobileOptimized320

Links:

ρhttps://rh0dev.github.io/
RSShttps://rh0dev.github.io/atom.xml
Bloghttps://rh0dev.github.io/
Archiveshttps://rh0dev.github.io/blog/archives
Toolshttps://rh0dev.github.io/tools
Abouthttps://rh0dev.github.io/about
https://github.com/rh0dev
https://twitter.com/rh0_gz
More on ASM.JS Payloads and Exploitationhttps://rh0dev.github.io/blog/2018/more-on-asm-dot-js-payloads-and-exploitation/
OffensiveCon 2018https://www.offensivecon.org/
previoushttps://rh0dev.github.io/blog/2017/the-return-of-the-jit/
blogpostshttps://rh0dev.github.io/blog/2017/the-return-of-the-jit-part-2/
ConstantDesasterhttps://github.com/rh0dev/shellcode2asmjs/blob/master/out/msf_exec_cmd_float_pool.html
Read on →https://rh0dev.github.io/blog/2018/more-on-asm-dot-js-payloads-and-exploitation/
The Return of the JIT (Part 2)https://rh0dev.github.io/blog/2017/the-return-of-the-jit-part-2/
part 1https://rh0dev.github.io/blog/2017/the-return-of-the-jit/
CVE-2017-5375https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5375
CVE-2017-5400https://www.mozilla.org/en-US/security/advisories/mfsa2017-05/#CVE-2017-5400
Read on →https://rh0dev.github.io/blog/2017/the-return-of-the-jit-part-2/
The Return of the JIT (Part 1)https://rh0dev.github.io/blog/2017/the-return-of-the-jit/
CVE-2017-5375https://www.mozilla.org/en-US/security/advisories/mfsa2017-01/#CVE-2017-5375
CVE-2017-5400https://www.mozilla.org/en-US/security/advisories/mfsa2017-05/#CVE-2017-5400
Flashhttps://dl.packetstormsecurity.net/papers/shellcode/Writing-JIT-Spray-Shellcode.pdf
Apple Safarihttps://www.exploit-db.com/exploits/14221
info leak gadgets in Flashhttp://zhodiac.hispahack.com/my-stuff/security/Flash_Jit_InfoLeak_Gadgets.pdf
other client softwarehttps://www.nccgroup.trust/globalassets/resources/us/presentations/documents/attacking_clientside_jit_compilers_paper.pdf
Microsoft’s WARP Shader JIT Enginehttps://sites.google.com/site/bingsunsec/WARPJIT/JIT%20Spraying%20Never%20Dies%20-%20Bypass%20CFG%20By%20Leveraging%20WARP%20Shader%20JIT%20Spraying.pdf
Read on →https://rh0dev.github.io/blog/2017/the-return-of-the-jit/
Fun With Info-Leakshttps://rh0dev.github.io/blog/2015/fun-with-info-leaks/
WinDbghttp://msdn.microsoft.com/en-us/windows/hardware/hh852365.aspx
heaphttps://www.corelan.be/index.php/2011/12/31/exploit-writing-tutorial-part-11-heap-spraying-demystified/
sprayhttps://www.corelan.be/index.php/2013/02/19/deps-precise-heap-spray-on-firefox-and-ie10/
info-leakshttps://media.blackhat.com/bh-us-12/Briefings/Serna/BH_US_12_Serna_Leak_Era_Slides.pdf
Read on →https://rh0dev.github.io/blog/2015/fun-with-info-leaks/
Blog Archiveshttps://rh0dev.github.io/blog/archives
More on ASM.JS Payloads and Exploitationhttps://rh0dev.github.io/blog/2018/more-on-asm-dot-js-payloads-and-exploitation/
The Return of The JIT (Part 2)https://rh0dev.github.io/blog/2017/the-return-of-the-jit-part-2/
The Return of The JIT (Part 1)https://rh0dev.github.io/blog/2017/the-return-of-the-jit/
Fun With Info-Leakshttps://rh0dev.github.io/blog/2015/fun-with-info-leaks/
Octopresshttp://octopress.org
mnmlhttps://github.com/ioveracker/mnml

Viewport: width=device-width, initial-scale=1


URLs of crawlers that visited me.