Haydar Abessi (aka hyzr) Logo
Haydar Abessi (aka hyzr)
WriteupsResume

    Technical Blog

    In-depth articles on cybersecurity research, reverse engineering techniques, and software development insights.

    Advanced ROP Chain Construction in Modern Binaries
    Featured
    Binary Exploitation
    1/15/2024
    12 min read
    Advanced ROP Chain Construction in Modern Binaries
    Exploring cutting-edge return-oriented programming techniques and automated chain generation for bypassing modern exploit mitigations in contemporary software.
    ROP
    Assembly
    Exploitation
    Read More
    Reverse Engineering Obfuscated Malware
    Malware Analysis
    1/10/2024
    15 min read
    Reverse Engineering Obfuscated Malware
    A comprehensive guide to analyzing heavily obfuscated malware samples using static and dynamic analysis techniques with modern tools.
    Malware
    IDA Pro
    Ghidra
    Read More
    Building Secure APIs: A Developer's Guide
    Web Security
    1/5/2024
    8 min read
    Building Secure APIs: A Developer's Guide
    Essential security practices for API development, covering authentication, authorization, input validation, and common vulnerabilities.
    API
    Security
    Authentication
    Read More
    Memory Corruption Vulnerabilities in C/C++
    Binary Exploitation
    12/28/2023
    10 min read
    Memory Corruption Vulnerabilities in C/C++
    Deep dive into buffer overflows, use-after-free, and other memory corruption bugs with practical exploitation examples.
    C++
    Memory
    Vulnerabilities
    Read More
    Static Analysis with Ghidra: Advanced Techniques
    Reverse Engineering
    12/20/2023
    9 min read
    Static Analysis with Ghidra: Advanced Techniques
    Leveraging Ghidra's powerful features for complex binary analysis and reverse engineering workflows in security research.
    Ghidra
    Static Analysis
    Reverse Engineering
    Read More
    Cryptographic Implementation Flaws
    Cryptography
    12/15/2023
    7 min read
    Cryptographic Implementation Flaws
    Common cryptographic implementation mistakes and how to identify them during security assessments and code reviews.
    Cryptography
    Vulnerabilities
    Implementation
    Read More
    Search Articles
    Categories
    Binary Exploitation
    8
    Malware Analysis
    6
    Reverse Engineering
    5
    Web Security
    4
    Cryptography
    3
    Tools & Tutorials
    7
    Popular Tags
    ROP
    Assembly
    IDA Pro
    Ghidra
    Python
    C++
    Cryptography
    Buffer Overflow
    Static Analysis
    Dynamic Analysis
    Shellcode
    API Security
    Recent Posts

    Advanced ROP Chain Construction

    1/15/2024

    Reverse Engineering Obfuscated Malware

    1/10/2024

    Building Secure APIs

    1/5/2024