|
You are here |
mdanilor.github.io | ||
| | | | |
modexp.wordpress.com
|
|
| | | | | Introduction Quick post about Windows System calls that I forgot about working on after the release of Dumpert by Cn33liz last year, which is described in this post. Typically, EDR and AV set hooks on Win32 API or NT wrapper functions to detect and mitigate against malicious activity. Dumpert attempts to bypass any user-level hooks... | |
| | | | |
alice.climent-pommeret.red
|
|
| | | | | ||
| | | | |
www.code-intelligence.com
|
|
| | | | | A dynamic stack buffer overflow vulnerability in the Abseil C++ library (abseil-cpp) was autonomously identified through AI-enhanced fuzz testing using CI Fuzz's AI Test Agent. Learn more in this blog. | |
| | | | |
www.moddable.com
|
|
| | | Presentation to TC39, the JavaScript language committee, to introduce XS, the JavaScript engine by Moddable Tech. Background on the XS engine and technical details on techniques used to minimize memory and code size, while maintaining near full conformance. | ||