diff --git a/README.md b/README.md index cd47eec..327318e 100644 --- a/README.md +++ b/README.md @@ -101,6 +101,26 @@ [Microcontroller Courses from Coursera](https://www.coursera.org/courses?query=microcontroller) +[ARM64 Blog Series - Part 1: ARM Instruction Set + Simple Heap Overflow](https://8ksec.io/arm64-reversing-and-exploitation-part-1-arm-instruction-set-simple-heap-overflow/) + +[ARM64 Blog Series - Part 2: Use After Free](https://8ksec.io/arm64-reversing-and-exploitation-part-2-use-after-free/) + +[ARM64 Blog Series - Part 3: A Simple ROP Chain](https://8ksec.io/arm64-reversing-and-exploitation-part-3-a-simple-rop-chain/) + +[ARM64 Blog Series - Part 4: Using Mprotect() To Bypass NX Protection](https://8ksec.io/arm64-reversing-and-exploitation-part-4-using-mprotect-to-bypass-nx-protection-8ksec-blogs/) + +[ARM64 Blog Series - Part 5: Writing Shellcode](https://8ksec.io/arm64-reversing-and-exploitation-part-5-writing-shellcode-8ksec-blogs/) + +[ARM64 Blog Series - Part 6: Exploiting An Uninitialized Stack Variable Vulnerability](https://8ksec.io/arm64-reversing-and-exploitation-part-6-exploiting-an-uninitialized-stack-variable-vulnerability/) + +[ARM64 Blog Series - Part 7: Bypassing ASLR And NX](https://8ksec.io/arm64-reversing-and-exploitation-part-7-bypassing-aslr-and-nx/) + +[ARM64 Blog Series - Part 8: Exploiting An Integer Overflow Vulnerability](https://8ksec.io/arm64-reversing-and-exploitation-part-8-exploiting-an-integer-overflow-vulnerability/) + +[ARM64 Blog Series - Part 9 :Exploiting An Off By One Overflow Vulnerability](https://8ksec.io/arm64-reversing-and-exploitation-part-9-exploiting-an-off-by-one-overflow-vulnerability/) + +[ARM64 Blog Series - Part 10: Intro To Arm Memory Tagging Extension (MTE)](https://8ksec.io/arm64-reversing-and-exploitation-part-10-intro-to-arm-memory-tagging-extension-mte/) + # ARM Tools & Projects [Back to the Top](https://github.com/mikeroyal/ARM-Guide#table-of-contents)