ARM64 Reversing And Exploitation Part 4 – Using mprotect() to bypass NX Protection
https://8ksec.io/arm64-reversing-and-exploitation-part-4-using-mprotect-to-bypass-nx-protection-8ksec-blogs/
https://8ksec.io/arm64-reversing-and-exploitation-part-4-using-mprotect-to-bypass-nx-protection-8ksec-blogs/
V8 in-the-wild exploit analysis by @r3tr074
https://retr0.zip/blog/cve-2025-6554-the-rabbit-hole.html
https://retr0.zip/blog/cve-2025-6554-the-rabbit-hole.html
ARM64 Reversing And Exploitation Part 5 – Writing Shellcode
https://8ksec.io/arm64-reversing-and-exploitation-part-5-writing-shellcode-8ksec-blogs/
https://8ksec.io/arm64-reversing-and-exploitation-part-5-writing-shellcode-8ksec-blogs/