|
You are here |
blog.k3170makan.com | ||
| | | | |
mdanilor.github.io
|
|
| | | | | A beginers guide into a Linux Kernel stack overflow vulnerability. | |
| | | | |
www.nickgregory.me
|
|
| | | | | Security research, programming, and more. | |
| | | | |
www.welivesecurity.com
|
|
| | | | | ESET researchers identified a malicious PDF sample that revealed that the sample exploited two unknown vulnerabilities, a remote-code execution vulnerability in Adobe Reader and a privilege escalation vulnerability in Microsoft Windows, that when combined became extremely powerful. | |
| | | | |
www.willsroot.io
|
|
| | | Vulnerability Research on Low-Level Systems | ||