|
You are here |
blog.infosectcbr.com.au | ||
| | | | |
exploiter.dev
|
|
| | | | | FUSE for Linux Exploitation 101 | |
| | | | |
mutur4.github.io
|
|
| | | | | This post covers yet another Binary Exploitation attack that is somewhat similar to return-oriented-programming (ROP) to understand how this works, we first need to understand Linux signals. | |
| | | | |
mdanilor.github.io
|
|
| | | | | A beginers guide into a Linux Kernel stack overflow vulnerability. | |
| | | | |
www.trailofbits.com
|
|
| | | [AI summary] The text discusses the security considerations for using AWS Nitro Enclaves, covering topics such as secure randomness, side-channel attacks, memory management, and time sources. It emphasizes the importance of proper configuration and mitigation strategies to protect against potential vulnerabilities. | ||