Introduction
Introduction Statistics Contact Development Disclaimer Help
1.txt - Introduction (by The Phrack Staff)
2.txt - Phrack Prophile on xerub (by The Phrack Staff)
3.txt - The Art of Exploitation: Attacking JavaScript Engines. A case study of …
4.txt - Cyber Grand Shellphish (by Team Shellphish)
5.txt - VM escape: QEMU case study (by Mehdi Talbi, Paul Fariello)
6.txt - .NET Instrumentation via MSIL bytecode injection (by Antonio "s4tan" Pa…
7.txt - Twenty years of Escaping the Java Sandbox (by Ieu Eauvidoum and disk no…
8.txt - Viewer Discretion Advised: (De)coding an iOS Kernel Vulnerability (by A…
9.txt - The Art of Exploitation: Compile Your Own Type Confusions. Exploiting L…
10.txt - Hypervisor Necromancy: Reanimating Kernel Protectors - or: On emulatin…
11.txt - Tale of two hypervisor bugs - Escaping from FreeBSD bhyve (by Reno Rob…
12.txt - The Bear in the Arena (by xerub)
13.txt - Exploiting a Format String Bug in Solaris CDE (by Marco Ivaldi)
14.txt - Segfault.net eulogy (by skyper)
15.txt - YouTube Security Scene (by LiveOverflow)
You are viewing proxied material from gopher.fnord.one. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.