2015-10-08 | Cisco Web VPNs Leveraged for Access and Persistence | ourren | 2614 | |
2015-09-29 | Revisiting Apple IPC: (1) Distributed Objects | 路人甲 | 2901 | |
2015-09-29 | Abusing GDI for ring0 exploit primitives | 路人甲 | 2572 | |
2015-09-28 | IoSpy and IoAttack | 路人甲 | 5639 | |
2015-09-27 | FCatalog: Find similarities between binary functions | ourren | 2785 | |
2015-09-27 | CVE-2015-2546:从补丁比对到Exploit | ourren | 3732 | |
2015-09-25 | CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough | ourren | 3452 | |
2015-09-23 | A list of IDA Plugins | ourren | 2983 | |
2015-09-19 | Exploit开发系列教程-Windows基础&shellcode | 路人甲 | 2681 | |
2015-09-19 | 利用BitmapData对象对抗Flash Player的隔离堆 | 路人甲 | 2814 | |
2015-09-17 | Readactor-Practical Code Randomization Resilient to Memory Disclosure | 路人甲 | 2621 | |
2015-09-16 | Finding Vulnerabilities in Core WordPress: A Bug Hunter’s Trilogy, Part III – Ul | MD | 2247 | |
2015-09-16 | DbgKit: first GUI extension for Debugging Tools for Windows | 路人甲 | 2161 | |