Explore >> Select a destination


You are here

www.alex-ionescu.com
| | scriptjunkie.us
3.9 parsecs away

Travel
| | [AI summary] The post details eight specific Windows features and services, such as SCM and Task Scheduler, that can be exploited to perform authenticated remote code execution on networked systems.
| | ntamonsec.blogspot.com
4.5 parsecs away

Travel
| | 0x00 Abstract Almost all the actions carried out by user mode applications and Windows executive subsystems (e.g. I/O Manager, Memory Manag...
| | www.catch22.net
6.1 parsecs away

Travel
| | Introduction to Device Drivers Seeing as I've been spending alot of time doing kernel-level programming recently I thought it was time I wrote a few articles on the subject. This first article (and the rest in this "kernel" series) will cover the steps needed to build, install and start a Windows NT device-driver.
| | jericho.blog
25.3 parsecs away

Travel
| What is a "zero day vulnerability"? It's a term that is frequently used in the vulnerability disclosure ecosystem. I have blogged on this topic frequently and reading some of this will give more history and context, so I won't rehash everything. If you read one blog, make it "No One Will Burn A Zero Day...