Azeria Labs Azeria Labs
  • ARM Assembly
    • Part 1: Introduction to ARM Assembly
    • Part 2: ARM Data Types and Registers
    • Part 3: ARM Instruction Set
    • Part 4: Memory Instructions: LDR/STR
    • Part 5: Load and Store Multiple
    • Part 6: Conditional Execution and Branching
    • Part 7: Stack and Functions
    • Assembly Basics Cheatsheet
  • Online Assembler
  • Exploitation
    • Writing ARM Shellcode
    • TCP Bind Shell in Assembly (ARM 32-bit)
    • TCP Reverse Shell in Assembly (ARM 32-bit)
    • Process Memory and Memory Corruption
    • Stack Overflows (Arm32)
    • Return Oriented Programming (Arm32)
    • Stack Overflow Challenges
    • Process Continuation Shellcode
    • Glibc Heap – malloc
    • Glibc Heap – free, bins, tcache
    • Part 1: Heap Exploit Development
    • Part 2: Heap Overflows and the iOS Kernel
    • Part 3: Grooming the iOS Kernel Heap
  • Lab Environment
    • ARM Lab VM 1.0
    • ARM Lab VM 2.0
    • Debugging with GDB and GEF
    • Emulate Raspberry Pi with QEMU
    • Running Arm Binaries on x86 with QEMU-User
    • Emulating Arm Firmware
  • TrustZone Research
    • TEEs and Arm TrustZone
    • Trustonic’s Kinibi TEE
  • Self-Improvement
    • Deep Work & The 30-Hour Method
    • Paradox of Choice
    • The Process of Mastering a Skill
  • About
Azeria Labs Azeria Labs
  • ARM Assembly
    • Part 1: Introduction to ARM Assembly
    • Part 2: ARM Data Types and Registers
    • Part 3: ARM Instruction Set
    • Part 4: Memory Instructions: LDR/STR
    • Part 5: Load and Store Multiple
    • Part 6: Conditional Execution and Branching
    • Part 7: Stack and Functions
    • Assembly Basics Cheatsheet
  • Online Assembler
  • Exploitation
    • Writing ARM Shellcode
    • TCP Bind Shell in Assembly (ARM 32-bit)
    • TCP Reverse Shell in Assembly (ARM 32-bit)
    • Process Memory and Memory Corruption
    • Stack Overflows (Arm32)
    • Return Oriented Programming (Arm32)
    • Stack Overflow Challenges
    • Process Continuation Shellcode
    • Glibc Heap – malloc
    • Glibc Heap – free, bins, tcache
    • Part 1: Heap Exploit Development
    • Part 2: Heap Overflows and the iOS Kernel
    • Part 3: Grooming the iOS Kernel Heap
  • Lab Environment
    • ARM Lab VM 1.0
    • ARM Lab VM 2.0
    • Debugging with GDB and GEF
    • Emulate Raspberry Pi with QEMU
    • Running Arm Binaries on x86 with QEMU-User
    • Emulating Arm Firmware
  • TrustZone Research
    • TEEs and Arm TrustZone
    • Trustonic’s Kinibi TEE
  • Self-Improvement
    • Deep Work & The 30-Hour Method
    • Paradox of Choice
    • The Process of Mastering a Skill
  • About
About this Website

Sharing knowledge is an important part of our community. We all have knowledge worth sharing with others in our unique way and our preferred format. With tiny graphics and visualizations, the tutorials on this website are meant to ease the learning process of rather dry and complex topics.

Azeria Labs is split in two parts: the site you are currently on contains free tutorials and lab environments and aims to be a source of knowledge for people interested in topics around Arm reverse engineering and exploitation of IoT and mobile devices. This site will always contain free content and does not contain any ads. The business site of Azeria Labs is Azeria Labs Trainings, offering on-site private training for tech companies and at top-tier security conferences including Black Hat and Infiltrate.

Feedback is highly appreciated, and if you have any suggestions or constructive criticism, you can reach out via Twitter DM or email: feedback[@]azeria-labs.com.

About the Author

Maria Markstedter [B.Sc. Corporate and IT Security | M.Sc. Enterprise Security | OSCP | Forbes 30 under 30 | Forbes Person of the Year in Cybersecurity 2020]

I’m the founder of Azeria Labs and the creator of the content you see on this site. Professionally, I’m a security researcher with a focus on exploit development and reverse engineering of Arm Cortex-A devices. I love teaching, and try to give back to the community as much as I can. Which is why I created this website to fill the gap in educational content around Arm security, providing free content and giving free workshops to developers who want to learn about the importance of exploit mitigations and are curious about how hackers exploit C/C++ vulnerabilities.

For updates and new releases, follow me or the official Azeria-Labs Twitter account: @Fox0x01 and @azeria_labs.

Support Azeria Labs

The content on this website will always be free and not contain any ads. If you want to support me for providing free content, you can buy this beautiful ARM Assembly Cheat Sheet as a Poster on Teespring or the digital version on Gumroad. 🙂

Topics

  • About
  • ARM Assembly Basics
  • ARM Exploit Development
  • Self-Improvement
  • Lab Fundamentals
  • APT Lifecycle Basics

Twitter: @Fox0x01 and @azeria_labs

New ARM Assembly Cheat Sheet

Poster Digital

Cheat Sheet
© 2017-2022 Azeria Labs™ | All Rights Reserved.