# About
- @kiks - VR - Trying to break stuff since ~2k16.
- kiks.zero (at) proton.me
# Archive
- Android Internals Deep Dive - Deserialization
- Android Internals Deep Dive - Deep and App Linking
- Android Internals Deep Dive - Implicit Intents
- Not All Roads Lead to PWN2OWN - CGI Fuzzing, AFL and ASAN - Part 3
- Not All Roads Lead to PWN2OWN - Firmware Reverse Engineering - Part 2
- Not All Roads Lead to PWN2OWN - Hardware Hacking - Part 1
- Exploiting a Quarantine UAF Mitigation on a Custom Allocator Challenge
- A Reverse Engineering Journey Walkthrough
- Linux Kernel DirtyCred File Exploitation applied on an io_uring UAF - CVE-2022-2602
- Linux Kernel Exploit Development - CVE-2020-27786
- Hunting for Linux Kernel Public Vulnerabilities
- Kernel Read Write Execute - KRWX
- Android Inter-Process Communication - Binder and Service Manager Perspective - Part 2
- Android Inter-Process Communication - Introduction - Part 1
- Owncloud Multiple Vulnerabilities
- Moodle Server-Side Request Forgery Vulnerability
- Remote Mobile Phone Geolocalization
- Rusty Joomla Remote Code Execution
- How To Write FUD Malware (Thesis)
This, the thrill of pwning a system, this is the greatest rush.