Explore >> Select a destination


You are here

xcellerator.github.io
| | docfate111.github.io
4.2 parsecs away

Travel
| | [AI summary] A detailed explanation of a Linux kernel vulnerability (CVE-2021-42327) in the GPU driver, involving a SLUB buffer overflow that allows privilege escalation and arbitrary code execution through exploitation techniques like heap spraying and KASLR bypass.
| | mdanilor.github.io
4.1 parsecs away

Travel
| | A beginers guide into a Windows kernel stack overflow vulnerability from zero to advanced bypasses.
| | sergioprado.blog
4.7 parsecs away

Travel
| | In this article, we will learn how to debug the Linux kernel on an embedded Linux system with GDB.
| | wsummerhill.github.io
19.5 parsecs away

Travel
| I'm going to cover an example of how to perform a DLL sideload from start to finish using a C++ payload and a legitimate DLL commonly found on disk. The specific technique covered is known as "DLL proxying" where we use the legitimate DLL along with a malicious DLL which exports all the functions that the legit DLL to execute properly.