Explore >> Select a destination


You are here

www.jaybosamiya.com
| | mdanilor.github.io
5.2 parsecs away

Travel
| | A beginers guide into a Windows kernel stack overflow vulnerability from zero to advanced bypasses.
| | blog.quarkslab.com
4.7 parsecs away

Travel
| | Following our presentation at Black Hat USA, in this blog post we provide some details on CVE-2022-20233, the latest vulnerability we found on Titan M, and how we exploited it to obtain code execution on the chip.
| | unorde.red
6.7 parsecs away

Travel
| | [AI summary] A detailed writeup of solving the 'Bangalore' level in the Microcorruption CTF, focusing on bypassing Data Execution Prevention (DEP) through interrupt manipulation and shellcode execution.
| | spin.ai
22.5 parsecs away

Travel
| Is cloud storage safe from ransomware? In this article, we will try to prove the opposite. We will work together and create our cloud data protection strategy.