Frequent verification codes may appear for non-Mainland China IP visits. If visitors are severely affected, please send [IP|ASN](18.232.127.73|AS14618) to the bottom mailbox to add to the whitelist

文章列表

dby 22:57   Zero Day Initiative — Pwn2Own Toronto 2022 - The Schedule    #[email protected] #安全文章   submitted by   /u/soupcreamychicken [link]   [留言]

dby 09:52   Exploit Education's Phoenix Stack Three Challenge Writeup    #[email protected] #安全文章 Hi everyone, I have just released the writeup for Exploit Education's Phoenix Stack Three challenge. Any reactions & feedback would be most welcome. Thanks in advance! https://medium.com/bugbountywriteup/phoenix-challenges-stack-three-984e0434356b   submitted by   /u/ProgrammingBro123

2022-12-04 21:13   BOF Exploit fails outside GDB    #[email protected] #安全文章 i just started studying exploit development, currently doing exploits for linux x84 (running on 32 bit kali linux).but my exploit is not working outside GDB, running exploit payload inside gdb is giving me shell on machine but without GDB iam getting error, tried googling for this issue but didnt he

2022-12-04 21:04   Black Hat 2022 USA/ASIA/Europe    #[email protected] #安全文章 The videos of the BLACK HAT 2022 conference have been published on YouTube. USA https://www.youtube.com/playlist?list=PLH15HpR5qRsVKcKwvIl-AzGfRqKyx--zq ASIA : https://www.youtube.com/playlist?list=PLH15HpR5qRsW2vrD-6pHklASq8T_CPZBv EUROPE : https://www.youtube.com/playlist?list=PLH15HpR5qRsVY4gZPQ

2022-12-03 23:59   Using AI to write Malware?! (Ethical reasoning and future use cases)    #[email protected] #安全文章   submitted by   /u/Techryptic [link]   [留言]

2022-12-02 22:41   ? Mind-Blowing examples of OpenAI ChatGPT for Security, Infosec & Hacking    #[email protected] #安全文章   submitted by   /u/pat_ventuzelo [link]   [留言]

2022-12-02 04:52   A Journey into Fuzzing WebAssembly Virtual Machine [BHUSA 2022]    #[email protected] #安全文章   submitted by   /u/pat_ventuzelo [link]   [留言]

2022-11-26 00:42   [LIVE Nov 25, 2022 11AM PT] Off By One Security : Introduction to Linux Heap Exploitation    #[email protected] #安全文章   submitted by   /u/soupcreamychicken [link]   [留言]

2022-11-11 17:37   Off By One Security : A Look at Modern Windows Kernel Exploitation    #[email protected] #安全文章   submitted by   /u/soupcreamychicken [link]   [留言]

2022-11-09 12:35   CyberDucky, hacking made fun!    #[email protected] #安全文章 Hi everyone ! I am starting a new series to make hacking fun for everyone! Please , I'd love any feedback! I'm here for you! https://youtube.com/playlist?list=PLphiijzMibrnNkK7EFdHmEJMHoZiFD_6k   submitted by   /u/cyberducky0_0 [link]   [留言]

2022-11-06 18:24   Buffer overflows    #[email protected] #安全文章 Hey all, i was learning about buffer overflows and practicing on some intentionally vulnerable targets and had this doubt. does BoF exist in real world targets(out of curiosity)?. Hope many people here will be working professionals (as exploit dev / vuln researcher) so i thought this sub reddit coul

2022-11-04 17:03   Immunity Debugger crash on M1 Mac    #[email protected] #安全文章 Hello everyone. I am using a macbook pro 16 with m1 pro and have set up a VM via UTM to emulate Windows XP and Windows 7. These x86 and x64 machines work quite well and I need them to study Windows exploit development. For this reason I have installed within these machines Immunity Debugger, but whe

2022-10-31 06:26   Phoenix Challenges -- Stack Two    #[email protected] #安全文章 My latest writeup for the Exploit.Education Phoenix exploitation challenge is now live on my Medium blog. More are planned to be coming soon. Any feedback would be most welcome! ​ https://secnate.medium.com/phoenix-challenges-stack-two-da59b290dfa   submitted by   /u/ProgrammingBro1

2022-10-25 08:37   Buffer overflow, canary enabled but program only seems to accept arguments as input    #[email protected] #安全文章   submitted by   /u/Cascodius [link]   [留言]

2022-10-25 01:27   Atlassian Jira Align High-Risk Vuln Write-up    #[email protected] #安全文章   submitted by   /u/breach_house [link]   [留言]

By QianX.in