|
You are here |
xcellerator.github.io | ||
| | | | |
docfate111.github.io
|
|
| | | | | [AI summary] A detailed explanation of a Linux kernel vulnerability (CVE-2021-42327) in the GPU driver, involving a SLUB buffer overflow that allows privilege escalation and arbitrary code execution through exploitation techniques like heap spraying and KASLR bypass. | |
| | | | |
mdanilor.github.io
|
|
| | | | | A beginers guide into a Windows kernel stack overflow vulnerability from zero to advanced bypasses. | |
| | | | |
sergioprado.blog
|
|
| | | | | In this article, we will learn how to debug the Linux kernel on an embedded Linux system with GDB. | |
| | | | |
wsummerhill.github.io
|
|
| | | I'm going to cover an example of how to perform a DLL sideload from start to finish using a C++ payload and a legitimate DLL commonly found on disk. The specific technique covered is known as "DLL proxying" where we use the legitimate DLL along with a malicious DLL which exports all the functions that the legit DLL to execute properly. | ||