Shellcode

Results: 175



#Item
11DATA S H E E T  Anti-exploit for business Innovative exploit mitigation delivers four layers of protection WHAT IT DOES FOR YOU •	 Protects browsers, including Internet

DATA S H E E T Anti-exploit for business Innovative exploit mitigation delivers four layers of protection WHAT IT DOES FOR YOU • Protects browsers, including Internet

Add to Reading List

Source URL: www.malwarebytes.com

Language: English - Date: 2016-08-17 18:03:01
12Exploitation techniques for NT kernel Adrien ‘Adr1’ Garin Introduction

Exploitation techniques for NT kernel Adrien ‘Adr1’ Garin Introduction

Add to Reading List

Source URL: www.lse.epita.fr

Language: English - Date: 2016-08-09 05:04:08
13William Owen Redwood Contact Information Department of Computer Science The Florida State University

William Owen Redwood Contact Information Department of Computer Science The Florida State University

Add to Reading List

Source URL: ww2.cs.fsu.edu

Language: English - Date: 2013-02-18 11:48:25
14風水 Heap Feng Shui in JavaScript Alexander Sotirov   Introduction

風水 Heap Feng Shui in JavaScript Alexander Sotirov Introduction

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
15Let your Mach-O fly Vincenzo Iozzo  January 15, 2009 Abstract Mac OS X is starting to spread among users, so new exploitation

Let your Mach-O fly Vincenzo Iozzo January 15, 2009 Abstract Mac OS X is starting to spread among users, so new exploitation

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
16Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2016-01-02 20:09:14
17Framing Signals—A Return to Portable Shellcode Erik Bosman Vrije Universiteit Amsterdam

Framing Signals—A Return to Portable Shellcode Erik Bosman Vrije Universiteit Amsterdam

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2014-03-24 10:31:12
18EECS 388 Intro to Computer Security October 24, 2014 Project 4: Application Security

EECS 388 Intro to Computer Security October 24, 2014 Project 4: Application Security

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2014-12-24 15:06:41
19Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow  Fabian Monrose

Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow Fabian Monrose

Add to Reading List

Source URL: wwwx.cs.unc.edu

Language: English - Date: 2014-09-05 15:38:44
20風水 Heap Feng Shui in JavaScript Alexander Sotirov   Introduction

風水 Heap Feng Shui in JavaScript Alexander Sotirov Introduction

Add to Reading List

Source URL: www.phreedom.org

Language: English - Date: 2013-06-01 20:57:17