2019-03-22 | An introduction to privileged file operation abuse on Windows | re4lity | 1738 | |
2019-03-22 | Google Books X-Hacking | re4lity | 1838 | |
2019-03-22 | Karta - source code assisted fast binary matching plugin for IDA | re4lity | 1918 | |
2019-03-22 | CVE-2018-8024: Apache Spark XSS vulnerability in UI | re4lity | 1995 | |
2019-03-22 | CVE-2019-5786 FileReader Exploit | re4lity | 1628 | |
2019-03-20 | 自动监控目标子域,助你快速挖洞——Sublert | BaCde | 2449 | |
2019-03-20 | Spotless Sandboxes: Evading Malware Analysis Systems using Wear-and-Tear Artifac | z3r0yu | 6378 | |
2019-03-20 | Writing a Custom Shellcode Encoder | re4lity | 4959 | |
2019-03-20 | Multiple Ways to Exploiting OSX using PowerShell Empire | re4lity | 1841 | |
2019-03-20 | CVE-2019–5420 and defence-in-depth | re4lity | 2381 | |
2019-03-20 | Exploiting OGNL Injection in Apache Struts | re4lity | 1467 | |
2019-03-20 | Hamburglar: collect useful information from urls, directories, and files | re4lity | 1449 | |
2019-03-20 | Awesome Node.js for penetration testers | re4lity | 2116 | |