You are here |
blog.zx2c4.com | ||
| | | |
crocidb.com
|
|
| | | | Clarifying the shebang (#!) mechanism: A step-by-step look using strace and kernel code shows how Linux handles script execution directly, revealing the shell isn't involved initially. | |
| | | |
hernan.de
|
|
| | | | When I heard about the emergency disclosure of CVE-2019-2215 by Project Zero, I decided to replicate the exploit on my local device to see it in action. I so... | |
| | | |
blog.tofile.dev
|
|
| | | | Using eBPF to uncover in-memory loading | |
| | | |
andrewshitov.com
|
|
| |