|
You are here |
blog.quarkslab.com | ||
| | | | |
oldboy21.github.io
|
|
| | | | | Ciao World, since I can't get enough of playing around with the Reflective DLL that inspired the very first blog during the Christmas Holiday, after the YOLO Loader I decided to grant the little nasty DLL a new super-power: Indirect syscalls So what I will be addressing here is: Indirect syscall: why and (mostly) references SSN enum and PIC challenges 1 tb of MASM Disclaimer I write code and implement techniques for research and learning purposes only. | |
| | | | |
cronop-io.github.io
|
|
| | | | | Walkthrough of a simple binary exploitation | |
| | | | |
gebir.ge
|
|
| | | | | ||
| | | | |
williamdurand.fr
|
|
| | | CVE-2016-0728 has been disclosed earlier this week and it is a serious security issue. The vulnerability affects most of the Linux kernel versions (3.8 and above). Although the exploit seems tricky to successfully use, it is still a flaw that has to be patched ASAP. | ||