Skip content

151 158 158 results

Filter by

  • CSRF And Unsafe Arbitrary File Upload In NextGEN Gallery...

    Please note the vulnerability detailed in this blog article was first discovered on Monday 9th March 2015, disclosed and...

    Read more
  • Windows Inline Function Hooking

    Hooking can be used by legitimate software for reverse engineering, for example, to examine the user mode function...

    Read more
  • Vulnerability Discovery Via 'Fuzzing'

    Why would you fuzz? People fuzz for many reasons, depending on the industry they are in, from reliable...

    Read more
  • DLL Injection: Part Two

    In a previous blog post I gave a high level overview of DLL injection, what it is used...

    Read more
  • DLL Injection: Part One

    DLL injection is a technique that can be used by legitimate software to add functionality, aid with debugging,...

    Read more
  • A Beginners’ Guide to Obfuscation

    Obfuscation is a technique used to change software code in order to make it harder for a human...

    Read more
  • Programmable Logic Controller (PLC) Security

    Industrial Control Systems (ICS) are very important components of our critical infrastructure. Programmable logic controllers (PLC) are some...

    Read more
  • Shellter – A Dynamic Shellcode Injector

    Recently, Shellter has been added to the official repository of Kali Linux. This is a very important milestone in the course...

    Read more

Error

Error

No results found

No results found that match your query

Loading results