Newest Post: A Special Character Release...

Good evening, readers. After years of reseaching and experimentation stuff, I finally completed a playable character, but as you can guess,  they will feature a new style format, being very different from what you are used to see in my old characters. You may even be surprised when seeing this character. It is not either Void.Schmelze or x00x00x... Ner'zhul.Seraphim: My first functional SuperNull playable character after 8 years of "hiatus", which has been  powered by the VoidShell library, allowing her to withstand most of the remote attacks while counterattacking her enemies when necessary. Contrary to other characters you have seen in the engine, she does not use a lot of visual  effects for her attacks but the ones she use are performed in an  ingenious way, so do not expect to see her full of VFXs. As she is remotely protected by her VSC threadworkers, she is virtually immune to all the CNS Obliteration and Player Replacement attack variants, so real defen...

M.U.G.E.N 1.00: Command Trigger - Buffer Overflow Attack

Good afternoon, friends.
Hmm, I never thought I would be talking about this vulnerability again, but well, let us go straight to the point.

As you can guess, this vulnerability also exists in M.U.G.E.N 1.00, but due to the NX Bit protection being active in the program, shellcodes cannot be directly executed, so it is required to use an exploit technique, known as Return-Oriented Programming, to circumvent said protection.

I have recently made an exploit that takes advantage of such vulnerability, but as there are several pointer limitations to build a ROP chain that jumps the engine back to default processing, it is currently limited to SuperNull ~ Reloader characters.

Sample image of Eikidankai using the CTBOF vulnerability in 1.00

Note:
As this exploit requires ROP chains to execute its shellcode, do not expect it to work on all the computers, so beware of it.

Well, that is all for today, have a nice day.