2019-03-22 | An introduction to privileged file operation abuse on Windows | re4lity | 1748 | |
2019-03-22 | Google Books X-Hacking | re4lity | 1857 | |
2019-03-22 | Karta - source code assisted fast binary matching plugin for IDA | re4lity | 1939 | |
2019-03-22 | CVE-2018-8024: Apache Spark XSS vulnerability in UI | re4lity | 2017 | |
2019-03-22 | CVE-2019-5786 FileReader Exploit | re4lity | 1635 | |
2019-03-20 | 自动监控目标子域,助你快速挖洞——Sublert | BaCde | 2465 | |
2019-03-20 | Spotless Sandboxes: Evading Malware Analysis Systems using Wear-and-Tear Artifac | z3r0yu | 6492 | |
2019-03-20 | Writing a Custom Shellcode Encoder | re4lity | 5006 | |
2019-03-20 | Multiple Ways to Exploiting OSX using PowerShell Empire | re4lity | 1863 | |
2019-03-20 | CVE-2019–5420 and defence-in-depth | re4lity | 2398 | |
2019-03-20 | Exploiting OGNL Injection in Apache Struts | re4lity | 1479 | |
2019-03-20 | Hamburglar: collect useful information from urls, directories, and files | re4lity | 1469 | |
2019-03-20 | Awesome Node.js for penetration testers | re4lity | 2138 | |