sequence.pdf
156.2 KB
Topics: Numerical Methods. #math
Lectures on Numerical Methods
https://ece.uwaterloo.ca/~dwharder/nm/Lecture_materials/
Lectures on Numerical Methods
https://ece.uwaterloo.ca/~dwharder/nm/Lecture_materials/
ece.uwaterloo.ca
ECE 204: Lecture materials | Department of Electrical and Computer Engineering | University of Waterloo
University of Waterloo, Department of Electrical and Computer Engineering, Undergraduate Program
p.file
How a group of hackers (FIN7) used SHIM databases to inject a malicious DLL in services.exe. I really liked this method, the SHIM implementation and SHIM databases made by Microsoft patch executables through in-memory patches, when the .exe is loaded into…
Kernel_Shim_Engine_for_fun_-_pwissenlit.pdf
1 MB
Topics: Windows Kernel Shim Engine. #windows #reversing #hacking
Abusing the Windows Kernel Shim Engine.
https://av.tib.eu/media/32752
PS: I forgot to send these ones, damn.
Abusing the Windows Kernel Shim Engine.
https://av.tib.eu/media/32752
PS: I forgot to send these ones, damn.
Forwarded from Autodidacts Riseup
Semiconductors @ Home - Cookbook! V.007.pdf
9.4 MB
"Semiconductors @ Home"
Forwarded from p.txt
2006.11946 (1).pdf
8.7 MB
If the paper you are searching for is not free, use @scihubot (just send the DOI and the bot will say whether the pdf is available or not)
https://www.researchgate.net/
https://ieeexplore.ieee.org/Xplore/home.jsp
https://link.springer.com/
https://www.springer.com/series/136
https://store.doverpublications.com/by-subject-mathematics.html
https://cyberleninka.ru/
https://www.ieee-security.org/TC/SP2022/program-papers.html
https://sscs.ieee.org/publications
https://ieeexplore.ieee.org/xpl/conhome/9886005/proceeding
https://www.sciencedirect.com/journal/journal-of-systems-architecture/issues
https://www.sciencedirect.com/journal/microprocessors-and-microsystems/issues
https://www.researchgate.net/profile/Wayne-Burleson
https://www.wistp.org/program/
https://safari.ethz.ch/phd-theses/
https://safari.ethz.ch/digitaltechnik/spring2022/doku.php?id=readings
https://www.refseek.com/
https://www.mdpi.com/2410-387X/5/1
https://arxiv.org/
https://philarchive.org/
https://scholar.google.com/schhp?hl=en&as_sdt=0,5
https://zbmath.org/
https://psycnet.apa.org/home
https://www.semanticscholar.org/
https://www.ncbi.nlm.nih.gov/
https://www.pnas.org/
https://elicit.org
https://supertech.csail.mit.edu/papers.html
https://comsec.ethz.ch/publications/
https://www.researchgate.net/
https://ieeexplore.ieee.org/Xplore/home.jsp
https://link.springer.com/
https://www.springer.com/series/136
https://store.doverpublications.com/by-subject-mathematics.html
https://cyberleninka.ru/
https://www.ieee-security.org/TC/SP2022/program-papers.html
https://sscs.ieee.org/publications
https://ieeexplore.ieee.org/xpl/conhome/9886005/proceeding
https://www.sciencedirect.com/journal/journal-of-systems-architecture/issues
https://www.sciencedirect.com/journal/microprocessors-and-microsystems/issues
https://www.researchgate.net/profile/Wayne-Burleson
https://www.wistp.org/program/
https://safari.ethz.ch/phd-theses/
https://safari.ethz.ch/digitaltechnik/spring2022/doku.php?id=readings
https://www.refseek.com/
https://www.mdpi.com/2410-387X/5/1
https://arxiv.org/
https://philarchive.org/
https://scholar.google.com/schhp?hl=en&as_sdt=0,5
https://zbmath.org/
https://psycnet.apa.org/home
https://www.semanticscholar.org/
https://www.ncbi.nlm.nih.gov/
https://www.pnas.org/
https://elicit.org
https://supertech.csail.mit.edu/papers.html
https://comsec.ethz.ch/publications/
ResearchGate
ResearchGate | Find and share research
Access 160+ million publication pages and connect with 25+ million researchers. Join for free and gain visibility by uploading your research.
Forwarded from p.file
bh-usa-07-afek-WP.pdf
447.6 KB
Concepts about the Dangling Pointer vulnerability and how it can lead into RCE. The example shows how to use the Dangling Pointer to make a fake vtable (inside the lookaside list of Windows heaps) and call a virtual function, pointing to shellcode, the concept is basically an UAF technique with a "Lookaside List Injection" like.