GAME ENGINES: A 0-DAY’S TALE
Tags:
hhu,
papers,
xss
Novell GroupWise Untrusted Pointer Dereference Exploitation
Tags:
jes,
papers,
zvs
Hacking Trust Relationships Between SIP Gateways
Tags:
octp,
papers,
pbll,
pdf
From Write to root on AIX
Tags:
exploit,
kkk,
papers,
pdf
Abusing, Exploiting and Pwning with Firefox Add-ons
Tags:
exploit,
jfif,
papers,
pdf
CloudFlare vs Incapsula vs ModSecurity
Tags:
incapsula,
papers,
Security
A Short Guide on ARM Exploitation
Tags:
exploit,
exploitation,
papers,
short
Manipulating Memory for Fun & Profit
Tags:
memory,
papers,
profit
[Turkish] Pen-Tester’s Guide for Metasploit Framework
Tags:
guide,
metasploit,
papers