tl;dr
- Buffer overflow in AArch64
- Bypass pointer authentication to leak libc and get shell
tl;dr
tl;dr
stdin stucture till main_arena.fastbin chunks to get overlapping chunk and leak.__malloc_hook using fastbin attack.tl;dr
char candle counter stored in the wax structure and trigger uaf.tl;dr
tl;dr
tl;dr
__GI__IO_file_jumps.dfprintf.tl;dr
tl;dr
tl;dr
mmap_threshold with null and trim top chunk size._IO_buf_base and brute force to get allocation on stdin.