Exploit primitives
In this section, you'll find my notes on common exploit primitives and how to implement them with different vulnerabilities. This section includes discussions on the following topics:
- Arbitrary write primitives
- Relative write primitives
- Arbitrary read primitives
- Chaining primitives to build an exploit
- Using write primitives to escalate privileges