|
You are here |
reverse.put.as | ||
| | | | |
www.triplefault.io
|
|
| | | | | A blog about general reverse engineering, security research, poking around Windows internals, and messing with the Intel x86/AMD64 architecture. | |
| | | | |
blog.k3170makan.com
|
|
| | | | | Hacking,Information Security,Penetration Testing,Google Hacking,Google Dorking,Keith Makan,Black Hat,Security Research,InfoSec,Web Site Security | |
| | | | |
pwning.systems
|
|
| | | | | Following up on my first blog post, I've received a few requests to write about setting up a debugging environment; however, since everybody uses different emulators and so on, I'll mainly focus on which config options are useful! You must first obtain the kernel sources for your preferred version before you can set up a kernel suitable for debugging. We'll have to decompress it after that. # use your preferred version $ wget https://git. | |
| | | | |
www.zerodayinitiative.com
|
|
| | | [AI summary] A critical remote code execution vulnerability in SolarWinds Access Rights Manager allows attackers to execute arbitrary code with service account privileges if proper data validation is not enforced. | ||