Exploit

Results: 786



#Item
141Computing / Software engineering / Computer programming / Data types / Control flow / C / DLL injection / Hooking / WindowProc / Subroutines / Callback / Typedef

MWR Labs Walkthrough Windows Kernel Exploitation 101: Exploiting CVESam Brown

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2016-04-05 16:42:45
142Computing / Cyberwarfare / Computer security / Mobile Malware / Malware / Android / Shedun

Mobile Exploit Intelligence Project   Dan  Guido,  Trail  of  Bits   Mike  Arpaia,  iSEC  Partners     ShakaCon,    

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
143

‫‪1‬‬ ‫زکات علم آموزش و انتقال آن به دیگران است‬ ‫‪2‬‬ ‫هقذهَ ای اص خْدم‬

Add to Reading List

Source URL: www.exploit-db.com

Language: Persian - Date: 2015-12-14 10:41:23
    144

    Manufacturing Compromise: The Emergence of Exploit-as-a-Service 2 †

    Add to Reading List

    Source URL: damonmccoy.com

    Language: English - Date: 2015-11-03 22:05:25
      145Trojan horses / National security / Crime prevention / Cyberwarfare / Hacking / SpyEye / Computer security / Zeus / Malware / Kill chain / Vulnerability / RSA Security

      The Exploit Intelligence Project Dan Guido —————————

      Add to Reading List

      Source URL: www.trailofbits.com

      Language: English - Date: 2016-04-15 11:36:17
      146

      WhiteCollarGroup THE MOST FORGOTTEN WEB VULNERABILITIES Written by 0KaL @ WhiteCollarGroup

      Add to Reading List

      Source URL: www.exploit-db.com

      Language: English - Date: 2016-02-10 10:06:51
        147

        Heap Models For Exploit Systems IEEE Security and Privacy LangSec Workshop 2015 Julien Vanegue Bloomberg L.P. New York, USA.

        Add to Reading List

        Source URL: spw15.langsec.org

        Language: English - Date: 2015-05-26 17:07:50
          148

          Powerful multi-layered defense delivers smart endpoint protection. Protects against new and exploit-based malware Get Malwarebytes Anti-Malware for Business and Malwarebytes Anti-Exploit for Business together in one pow

          Add to Reading List

          Source URL: de.malwarebytes.org

          Language: English
            149

            MySQL Error Based SQL Injection Using EXP Table of Contents Overview ......................................................................................................................................................

            Add to Reading List

            Source URL: www.exploit-db.com

            Language: English - Date: 2015-08-24 14:25:00
              150

              letters to nature important consequence of nonlinear gravitational processes if the initial conditions are gaussian, and is a potentially powerful signature to exploit in statistical tests of this class of models; see Fi

              Add to Reading List

              Source URL: www.barabasilab.com

              Language: English - Date: 2004-01-03 23:22:00
                UPDATE