![esjay Profile](https://pbs.twimg.com/profile_images/1588634951012024320/b0IzgQ_A_x96.jpg)
esjay
@esj4y
Followers
725
Following
2K
Statuses
932
Shell horticulturist @codewhitesec - blog @ https://t.co/TAuhn27aSX
Joined January 2019
RT @ale_sp_brazil: The third article (62 pages) of the Exploiting Reversing Series (ERS) is available on: I would…
0
102
0
RT @_ringzer0: From arbitrary pointer dereference to arbitrary read/write in latest Windows 11:
0
19
0
@alexjplaskett Focus on the fundamentals. A great sentence a mentor once told me was "The basics are advanced". Also try to dive deep into anything you're looking at. If you feel out of your comfort zone, you grow :)
0
0
2
@alexjplaskett Offensive security Web expert and offensive security exploitation expert. Just because the courses/manuals are great!
0
0
3
RT @R00tkitSMM: Weekend (2025) papers: QMSan: Efficiently Detecting Uninitialized Memory Errors During Fuzzing In…
0
25
0
RT @alexjplaskett: The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation
0
17
0
@PwnFunction Looks like two bytes. On Windows userspace ASLR typically does result in 20 bits of randomness
0
0
1
RT @testanull: Everything in this blog are already written, this is just for my bad memory only!
0
18
0
RT @noperator: The first in a three-part series detailing my team's work in decrypting and analyzing SonicWall firewall firmware 🔥🧱 https:/…
0
17
0
@ZoomZoomZero @AzakaSekai_ Edit: Not the index register, the base address/register value not being null of course.
0
0
1