Explore >> Select a destination


You are here

rtx.meta.security
| | manybutfinite.com
4.4 parsecs away

Travel
| | Last week we looked at how the stack works and how stack frames are built during function prologues. Now it's time to look at the inverse process as stack frames are destroyed in function epilogues.
| | sergioprado.blog
3.1 parsecs away

Travel
| | AddressSanitizer (ASan) is an instrumentation tool created by Google security researchers to identify memory access problems in C and C++ programs.
| | blog.quarkslab.com
3.1 parsecs away

Travel
| | Following our presentation at Black Hat USA, in this blog post we provide some details on CVE-2022-20233, the latest vulnerability we found on Titan M, and how we exploited it to obtain code execution on the chip.
| | shuheikagawa.com
46.9 parsecs away

Travel
| Twitter Cards show links to your website bigger on the timeline. This post explains how I generated images for Twitter Cards from blog post titles using node-canvas, inspired by Hatena Blog.