Source Byte
7.8K subscribers
852 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Excellent guide by dhaval kapil on glibc heap internals and exploitation techniques
heap-exploitation.dhavalkapi…

#exploit , #heap , #windows_internls
👍3
Forwarded from Proxy Bar
CVE-2024-21378 Microsoft Outlook Remote Code Execution
*
Описание работы внутри файла
*
POC exploit

#outlook #exploit
👍4👎1
Forwarded from Source Chat (GOJO)
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from CyberSecurityTechnologies (-CST-)
viper.pdf
4.5 MB
#exploit
"One Flip is All It Takes:
Identifying Syscall-Guard Variables for Data-Only Attacks", 2024.
]-> https://github.com/psu-security-universe/viper
]-> https://github.com/PSU-Security-Universe/data-only-attacks
🔥3
Forwarded from CyberSecurityTechnologies (-CST-)
👍32
exploit.education provides a variety of resources that can be used to learn about vulnerability analysis, exploit development, software debugging, binary analysis, and general cyber security issues.



#exploit_dev ,
👍4🔥2