Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks
#exploitation
#binary
———
🆔 @Infosec_Fortress
#exploitation
#binary
———
🆔 @Infosec_Fortress
HookFinder: Identifying and Understanding Malware Hooking Behaviors
#slides
#malware
———
🆔 @Infosec_Fortress
#slides
#malware
———
🆔 @Infosec_Fortress
👍1
RPISEC - Modern Binary Exploitation
Github page to access VM Lab
#slides
#binary
#exploitation
———
🆔 @Infosec_Fortress
Github page to access VM Lab
#slides
#binary
#exploitation
———
🆔 @Infosec_Fortress
👍1
Blackhat USA 2017 - Write-What-Where Vulnerabilities
#slides
#blackhat
#exploitation
#binary
———
🆔 @Infosec_Fortress
#slides
#blackhat
#exploitation
#binary
———
🆔 @Infosec_Fortress
Brandon Edwards - Source Code Audit - Fall 2011
#binary
#audit
#secure_programming
———
🆔 @Infosec_Fortress
#binary
#audit
#secure_programming
———
🆔 @Infosec_Fortress
TrendMicro - Black Basta-Affiliated Water Curupira’s Pikabot Spam Campaign - Malware Report
#malware
#report
———
🆔 @Infosec_Fortress
#malware
#report
———
🆔 @Infosec_Fortress
Solmaz Salimi - VulSlicer: Vulnerability Detection Through Code Slicing
#binary
#vulnerability
#article
———
🆔 @Infosec_Fortress
#binary
#vulnerability
#article
———
🆔 @Infosec_Fortress
👍1