About:

George Huebner's personal site

Website:

Specializations:

Outgoing Links:

Subscribe to RSS:
The blog post discusses a kernel exploitation challenge, detailing the process of exploiting a vulnerable kernel module to achieve privilege escalation. It covers various techniques such as buffer overflow detection, stack canary ...
A detailed guide on using eBPF with raw bytecode, covering program loading, socket filtering, and data sharing, aimed at developers and security researchers.
A detailed guide on using eBPF with raw bytecode, covering program loading, socket filtering, and data sharing through eBPF maps, with practical Zig code examples.
GOT-oriented programming (GOP) is a technique that leverages the Global Offset Table for control flow redirection in exploitation, particularly useful in CTF scenarios.
This post outlines advanced heap exploitation techniques from the HeapLAB course, detailing vulnerabilities and exploit strategies in Glibc's memory management.
The blog post discusses the Emacsjail challenge created for UIUCTF 2025, detailing the mechanics of an Emacs Lisp jail that restricts certain functionalities. It describes the challenge's structure, the creative solutions particip...
The blog post discusses a quantum computing challenge titled 'Schrödinger’s Cat' created for UIUCTF 2023. It describes the challenge's context, which involves using a quantum computer for enhanced security in SSH key management. T...
The blog post discusses the Emacs package 'Helpful' and its performance issues with the built-in help-mode, particularly when finding references to symbols. It suggests using a regex search with the tool 'ripgrep' as a faster alte...
The blog post discusses the Emacs package 'disaster' created by Justine Tunney, which allows users to disassemble C/C++ and Fortran code directly within their source editing environment. The author expresses a preference for x86_6...
The author discusses their experience using the RSS client Elfeed within Emacs, highlighting its user experience and extensibility. They share specific Emacs Lisp configurations to enhance Elfeed's functionality, such as managing ...
The blog post discusses how to integrate email notifications into the game NetHack using a mail daemon. It explains the setup process for compiling NetHack with mail options, creating a cron job to convert maildir to mbox format, ...
The author discusses creating a workflow for location-based reminders using the iOS app beorg and the Shortcuts app. They explore the challenges of triggering reminders based on location, including issues with phone unlocking and ...