Performing a Return-to-libc attack on ARM64 systems.
Calling mprotect on x64 Linux.
Exploiting memory corruption vulnerabilities on MIPS32 systems.
Exploiting command injection vulnerabilities.
Interacting with SPI to extract the contents of a ROM.
Intercepting signals from a HDMI monitor.
Interfacing with UART to gain command line access on a embedded device.
Falsifying Global Positioning System signals.
Performing VLAN hopping attacks.
Exploiting VRRP & HSRP.
Exceeding a network switches CAM table to intercept traffic.
Relaying WebClient Connections to LDAP become a local administrator.