2019-03-22 | An introduction to privileged file operation abuse on Windows | re4lity | 1723 | |
2019-03-22 | Google Books X-Hacking | re4lity | 1827 | |
2019-03-22 | Karta - source code assisted fast binary matching plugin for IDA | re4lity | 1886 | |
2019-03-22 | CVE-2018-8024: Apache Spark XSS vulnerability in UI | re4lity | 1974 | |
2019-03-22 | CVE-2019-5786 FileReader Exploit | re4lity | 1614 | |
2019-03-20 | 自动监控目标子域,助你快速挖洞——Sublert | BaCde | 2435 | |
2019-03-20 | Spotless Sandboxes: Evading Malware Analysis Systems using Wear-and-Tear Artifac | z3r0yu | 6190 | |
2019-03-20 | Writing a Custom Shellcode Encoder | re4lity | 4849 | |
2019-03-20 | Multiple Ways to Exploiting OSX using PowerShell Empire | re4lity | 1806 | |
2019-03-20 | CVE-2019–5420 and defence-in-depth | re4lity | 2370 | |
2019-03-20 | Exploiting OGNL Injection in Apache Struts | re4lity | 1431 | |
2019-03-20 | Hamburglar: collect useful information from urls, directories, and files | re4lity | 1442 | |
2019-03-20 | Awesome Node.js for penetration testers | re4lity | 2101 | |