You are here |
blog.lizzie.io | ||
| | | |
0x434b.dev
|
|
| | | | Continuing to walk down Linux Kernel exploitation lane. This time around with an unanticipated topic: DirtyPipe as it actually nicely fits the series as an example. | |
| | | |
hernan.de
|
|
| | | | When I heard about the emergency disclosure of CVE-2019-2215 by Project Zero, I decided to replicate the exploit on my local device to see it in action. I so... | |
| | | |
blog.quarkslab.com
|
|
| | | | ||
| | | |
dusty.phillips.codes
|
|
| | In earlier articles, we have implemented a tokenizer, parser, and transformer to convert WAT syntax to a Wasm AST, and got started on the code generation. In this part, we'll finally wrap up code generation and be able to compile our hello world sample into something that wasmtime can run. I hope. |