2018-09-06 | koadic-lol-malware-meets-python-based-command-and-control-c2-server-part-i | tolive | 1404 | |
2018-09-05 | what-is-it-that-makes-a-microsoft-executable | tolive | 1445 | |
2018-09-03 | HITB Gsec sg2018 | tolive | 1678 | |
2018-09-03 | Chainspotting! Building Exploit Chains with Logic Bugs | tolive | 4060 | |
2018-09-02 | Empowering red and blue teams with osint c0c0n 2017 | tolive | 1523 | |
2018-08-31 | h1-212 CTF Writeup | tolive | 2109 | |
2018-08-31 | (slide)-OWASP AppSecEU 2018 – Attacking "Modern" Web Technologies | tolive | 3603 | |
2018-08-30 | Subdomain Takeover: Going beyond CNAME | tolive | 1565 | |
2018-08-30 | AntSword2 安装指南 | fresh | 2223 | |
2018-08-30 | Grep Extractor a Burp Extender | tolive | 2160 | |
2018-08-29 | Microsoft Windows Zero-Day Found in Task Scheduler (local privilege escalation) | happytree | 12107 | |
2018-08-20 | reversing-and-patching-net-binaries-with-embedded-references | tolive | 1339 | |
2018-08-20 | arbitrary-unsigned-code-execution-vector-in-microsoft-workflow-compiler-exe | tolive | 1964 | |