Malicious DLL execution using Apple's APSDaemon.exe signed binary Security News & Discussion |
- Malicious DLL execution using Apple's APSDaemon.exe signed binary
- Using Win95 kernel32.dll exports like a virus.
- INFILTRATE 2019 Slides on Reverse Engineering With Ghidra [PDF, 16 MB]
- VMware Fusion 11 - Guest VM RCE
- UAC Bypass in System Reset Binary via DLL Hijacking
- autoBOF: a Journey into Automation, Exploit Development, and Buffer Overflows
- CVE-2019–5418: on WAF bypass and caching
- Exploiting CSRF on JSON endpoints with Flash and redirects
- OSINT Recon Great? - Unique Usernames Are Better Than Unique Passwords
- CarolinaCon 15: Writing Exploit-Resistant Code With OpenBSD
- Evil Clippy: MS Office maldoc assistant | Outflank Blog
- CVE-2019-7286 Part II: Gaining PC Control
- Exploiting Deserialisation in ASP.NET via ViewState | Soroush Dalili
- Dell KACE K1000 Remote Code Execution - the Story of Bug K1-18652
- Optimizing Elasticsearch for security log collection – part 1: reducing the number of shards
- Hack the JWT Token
- Security focused Q&A
You are subscribed to email updates from /r/netsec - Information Security News & Discussion. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment