core-jmp

core-jmp

death of core jump

  • Home
  • About
  • Privacy Policy

HomeASM

Posts in category: ASM

Defeating a 40-year-old copy protection dongle

Defeating a 40-year-old copy protection dongle

March 9, 2026
by oxfemale ASMMS-DOSwinapiwindows

Reverse engineering a vintage hardware copy-protection dongle used by 1980s enterprise software. By analyzing the DOS program and emulator environment, the author discovered the dongle check and bypassed it with a tiny patch.

Read More
ROP the ROM: Exploiting a Stack Buffer Overflow on STM32H5 in Multiple Ways

ROP the ROM: Exploiting a Stack Buffer Overflow on STM32H5 in Multiple Ways

February 25, 2026
by oxfemale ASMbuffer overflowHardwarepowershellROPSTM32H5

Article details exploiting a stack buffer overflow on an STM32H5. It demonstrates basic shellcode injection, then bypassing a non-executable stack (XN/MPU) using Return-Oriented Programming (ROP) with gadgets from the chip’s ROM code to dump firmware, showcasing advanced embedded exploitation techniques.

Read More
Living off the Process

Mastering Living off the Process in Offensive Security

February 2, 2026
by oxfemale ASMcppDebugGadgetsROPshellcodeUncategorizedwindows

No need for overusing WriteProcessMemory, VirtualAlloc, injecting a DLL, etc. This way, everything you need to manipulate the remote process is self-contained and already available to the process.

Read More

Recent Posts

  • Crimes against NTDLL – Implementing Early Cascade Injection
  • How Kernel Anti-Cheats Work: A Deep Dive into Modern Game Protection
  • Active Directory Security Assessment: Password Spraying, Privilege Escalation, and Kerberoasting
  • Reverse engineering undocumented Windows Kernel features to work with the EDR
  • Silent Harvest: Extracting Windows Secrets Under the Radar

Recent Comments

No comments to show.

Archives

  • March 2026
  • February 2026
  • January 2026
  • November 2025
  • September 2025

Categories

  • access
  • ACE
  • ACL
  • Active Directory
  • AD CS
  • Administrator
  • alloc
  • ALPC
  • Antivirus
  • APC
  • ASM
  • ASR
  • attaks
  • Audio
  • AV
  • BitLocker
  • Bluetooth
  • BSoD
  • buffer overflow
  • BYOVD
  • Bypassing
  • Cache
  • Callbacks
  • CLFS
  • cmd
  • Containers
  • cpp
  • CPU
  • Credential Attacks
  • Crypt
  • Cryptography
  • CryptoPro
  • Debug
  • Defender
  • DEP
  • DFIR
  • DMA
  • Driver
  • dump
  • EDR
  • Encryption
  • Escalation
  • ESP32
  • Evasion
  • Eventlog
  • exploitation
  • filesystem
  • firmware
  • Flash
  • Gadgets
  • GATT
  • Ghidra
  • Hardware
  • impact
  • Injection
  • IoT
  • kernel
  • kernel-mode
  • Library
  • Linux
  • LNK
  • Loader
  • LSA
  • Malware
  • MS-DOS
  • MS-EVEN
  • MS-LSAD
  • MS-SAMR
  • Network
  • PBA
  • PCI
  • PEB
  • Penetration Testing
  • Plugins
  • PoC
  • powershell
  • powershell
  • PPL
  • Privilege
  • Protection
  • PXE
  • QEMU
  • RCE
  • RedTeam
  • Registry
  • Reverse Engineering
  • root
  • ROP
  • RPC
  • Rust
  • SAM
  • Secure Boot
  • Security
  • shellcode
  • Shortcut
  • STM32H5
  • TEB
  • Telegram
  • TPM
  • UAC
  • UART
  • Uncategorized
  • user-mode
  • Warbird
  • WASM
  • winapi
  • winapi
  • WinDBG
  • windows
Log in
© 2026 core-jmp. All rights reserved.
Shopping Basket