2015-10-10 | ROP Illmatic: Exploring Universal ROP on glibc x86-64 (en) | Bincker | 3602 | |
2015-10-08 | Cisco Web VPNs Leveraged for Access and Persistence | ourren | 2651 | |
2015-09-29 | Revisiting Apple IPC: (1) Distributed Objects | 路人甲 | 2939 | |
2015-09-29 | Abusing GDI for ring0 exploit primitives | 路人甲 | 2583 | |
2015-09-28 | IoSpy and IoAttack | 路人甲 | 5652 | |
2015-09-27 | FCatalog: Find similarities between binary functions | ourren | 2825 | |
2015-09-27 | CVE-2015-2546:从补丁比对到Exploit | ourren | 3832 | |
2015-09-25 | CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough | ourren | 3480 | |
2015-09-23 | A list of IDA Plugins | ourren | 3008 | |
2015-09-19 | Exploit开发系列教程-Windows基础&shellcode | 路人甲 | 2698 | |
2015-09-19 | 利用BitmapData对象对抗Flash Player的隔离堆 | 路人甲 | 2833 | |
2015-09-17 | Readactor-Practical Code Randomization Resilient to Memory Disclosure | 路人甲 | 2646 | |
2015-09-16 | Finding Vulnerabilities in Core WordPress: A Bug Hunter’s Trilogy, Part III – Ul | MD | 2264 | |