Explore >> Select a destination


You are here

reverse.put.as
| | blog.lizzie.io
1.6 parsecs away

Travel
| |
| | hernan.de
1.5 parsecs away

Travel
| | When I heard about the emergency disclosure of CVE-2019-2215 by Project Zero, I decided to replicate the exploit on my local device to see it in action. I so...
| | xcellerator.github.io
2.1 parsecs away

Travel
| | Now that you know how to make a Linux kernel module that can hook any exposed function in kernel memory (Part 1 and Part 2), let's get down to writing a hook that does something interesting! In this first example, we're going to make a rootkit that intercepts calls to sys_kill. 99% of the time, we only use sys_kill (the userspace tool we normally use is the familiar kill) to kill a process, i.
| | blog.goodstuff.im
14.0 parsecs away

Travel
| [AI summary] A guide detailing the setup of Windows 10 and WSL2 for development, including installing Rust, configuring SSH, and integrating with VS Code.