Explore >> Select a destination


You are here

blog.infosectcbr.com.au
| | exploiter.dev
1.9 parsecs away

Travel
| | FUSE for Linux Exploitation 101
| | mutur4.github.io
1.8 parsecs away

Travel
| | This post covers yet another Binary Exploitation attack that is somewhat similar to return-oriented-programming (ROP) to understand how this works, we first need to understand Linux signals.
| | mdanilor.github.io
0.9 parsecs away

Travel
| | A beginers guide into a Linux Kernel stack overflow vulnerability.
| | www.trailofbits.com
17.8 parsecs away

Travel
| [AI summary] The text discusses the security considerations for using AWS Nitro Enclaves, covering topics such as secure randomness, side-channel attacks, memory management, and time sources. It emphasizes the importance of proper configuration and mitigation strategies to protect against potential vulnerabilities.