|
You are here |
mdanilor.github.io | ||
| | | | |
www.code-intelligence.com
|
|
| | | | | A dynamic stack buffer overflow vulnerability in the Abseil C++ library (abseil-cpp) was autonomously identified through AI-enhanced fuzz testing using CI Fuzz's AI Test Agent. Learn more in this blog. | |
| | | | |
www.malwaretech.com
|
|
| | | | | Evading user mode EDR hooks by hijacking the AppVerifier layer | |
| | | | |
klue.github.io
|
|
| | | | | Lately, I've decided to play around with HackSys Extreme Vulnerable Driver (HEVD) for fun. It's a great way to familiarize yourself with Windows exploitation. In this blog post, I'll show how to exploit the stack overflow that is protected with /GS stack cookies on Windows 7 SP1 32 bit. You can find the source code here. It has a few more exploits written and a Win10 pre-anniversary version of the regular stack buffer overflow vulnerability. | |
| | | | |
offlinemark.com
|
|
| | | Here is everything you need to know to set up a minimal Linux kernel dev environment on Ubuntu 20.04. It works great on small VPS instances, is optimized for a fast development cycle, and allows you to run custom binaries to exercise the specific kernel functionality being developed. Step 1: | ||