Exploit

Results: 786



#Item
131Security / Computing / Computer security / Computer network security / Software testing / Cryptography / National security / Secure communication / InfraGard / Vulnerability / QuickTime

The Exploit Intelligence Project Dan Guido NYM InfraGard, https://www.isecpartners.com

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
132Cryptography / Block cipher / Cipher / Encryption / Semantic security / Advantage / RSA / Data Encryption Standard / Feistel cipher / Optimal asymmetric encryption padding / Initialization vector

Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for eÆcient cryptography Mihir Bellare1 and Phillip Rogaway2 1

Add to Reading List

Source URL: seclab.cs.ucdavis.edu

Language: English - Date: 2004-06-21 18:50:20
133Formal sciences / Cryptography / Computer network security / Crime prevention / National security / Exploit / Computer security / Vulnerability / Computing / Security hacker / Theoretical computer science / Computer science

Why Offensive Security Needs Engineering Textbooks or, how to avoid a replay of “crypto wars” in security research Sergey Bratus, Iv´an Arce, Michael E. Locasto, Stefano Zanero August 22, 2014 Offensive security—o

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2014-08-22 21:44:16
134

Bypassing McAfee’s Application Whitelisting for Critical Infrastructure Systems Version: V1.0 | Date: Author: | Responsible: René Freingruber - SEC Consult Vulnerability Lab, Vienna Confidentiality Class: P

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2016-01-12 10:34:02
    135

    Explotación de Overflow memoria heap en Windows en Explotación de memoria heap personalizada en Windows 7

    Add to Reading List

    Source URL: www.exploit-db.com

    Language: Spanish - Date: 2016-01-21 14:58:34
      136

      955 Massachusetts Ave, Suite 130, Cambridge, MA 02139 + • fax: +FOR IMMEDIATE RELEASE OCTOBER 30, :30EDT First live SiteKey exploit seen in operation An active exploit of the SiteKe

      Add to Reading List

      Source URL: www.cr-labs.com

      Language: English - Date: 2007-10-30 00:00:00
        137

        Merhaba Arkadaşlar Türkçede Arka Kapı olarak geçen Backdoor kelimesine uzak olmadığımız gibi yakında değiliz. Arka Kapı terimi Matrixfilminde ki Seraph karakterinin anahtarla açtığı kapılardan ileri gitm

        Add to Reading List

        Source URL: www.exploit-db.com

        Language: Turkish - Date: 2015-12-29 10:10:18
          138

          AEG: Automatic Exploit Generation Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao and David Brumley Carnegie Mellon University, Pittsburgh, PA {thanassis, sangkilc, brentlim, dbrumley}@cmu.edu Abstract

          Add to Reading List

          Source URL: www.isoc.org

          Language: English - Date: 2011-05-09 09:06:44
            139

            ANALYSIS OF ANGLER’S
 NEW SILVERLIGHT EXPLOIT Mihai Neagu
 Senior Proactive Detection Researcher @ Bitdefender


            Add to Reading List

            Source URL: download.bitdefender.com

            Language: English - Date: 2016-03-10 12:26:56
              140

              PDF Document

              Add to Reading List

              Source URL: www.exploit-db.com

              Language: English - Date: 2015-12-14 10:46:17
                UPDATE