This repository contains my learning outcomes in studying ARM 64 assembly. It may serve as a reference for all of you.
Syscall: Link
ARM64 Reversing & Exploitation Series:
- Part 1: ARM Instruction Set + Simple Heap Overflow
- Part 2: Use After Free
- Part 3: A Simple ROP Chain
- Part 4: Using Mprotect() To Bypass NX Protection
- Part 5: Writing Shellcode
- Part 6: Exploiting An Uninitialized Stack Variable Vulnerability
- Part 7: Bypassing ASLR And NX
- Part 8: Exploiting An Integer Overflow Vulnerability
- Part 9: Exploiting An Off By One Overflow Vulnerability
- Part 10: Intro To Arm Memory Tagging Extension (MTE)