Buffer Overflows, ROP Chains, Shellcode, Vulnerability Research
Critical Infrastructure Caught in a Botnet
cisecurity.org·3d
Streaming Android applications via the browser
engineering.hackerearth.com·23h
How to Stay a Step Ahead of a Non-Obvious Threat
darkreading.com·5d
Introducing Nuskha
engineering.hackerearth.com·23h
Keys to the Kingdom: Erlang/OTP SSH Vulnerability Analysis and Exploits Observed in the Wild
unit42.paloaltonetworks.com·6d
The Small Device C Compiler for 8-bit firmware development (froscon2025)
cdn.media.ccc.de·4h
What I'm learning in 2024
waylonwalker.com·23h
external-secrets/external-secrets
github.com·2d
Loading...Loading more...