bcdefense
- Karma
- 9
- Created
- 8 years ago
Recent Submissions
- 1. ▲ From Buffer Overflow to JIT-Spray-ROP [pdf] (github.com)
- 2. ▲ Red Team: Initial Access (medium.com)
- 3. ▲ Binary Exploitation ELI5 – Part 3 (medium.com)
- 4. ▲ Binary Exploitation ELI5 – Part 2 (medium.com)
- 5. ▲ Binary Exploitation ELI5 – Part 1 (medium.com)
- 6. ▲ BOLO: Reverse Engineering – Part 2 (Advanced Programming Concepts) (medium.com)
- 7. ▲ BOLO: Reverse Engineering – Part 1 (Basic Programming Concepts) (medium.com)
- 8. ▲ Explain Spectre and Meltdown Like I'm 5 (medium.com)
- 9. ▲ Dadi – The New Internet (medium.com)