ASLR_on_the_Line_Practical_Cache_Attacks_on_the_MMU
Advances_in_format_string_exploitation
Automatic_Generation_of_Data-Oriented_Exploits
Control-Flow_Integrity_Principles_Implementations_and_Applications
Exploiting_Format_String_Vulnerabilities
Framing_Signals—A_Return_to_Portable_Shellcode
G-Free_Defeating_Return-Oriented_Programming_through_Gadget-less_Binaries
Glibc_Adventures_The_Forgotten_Chunks
Hackers_vs_Testers_A_Comparison_of_Software_Vulnerability_Discovery_Processes
Hacking-The_Art_of_Exploitation_2nd_Edition
How_the_ELF_Ruined_Christmas
Jump-Oriented_Programming_A_New_Class_of_Code-Reuse_Attack
Just-in-time_code_reuse_On_the_effectiveness_of_fine-grained_address_space_layout_randomization
LAVA_Large-scale_Automated_Vulnerability_Addition
Modern_Binary_Exploitation
New_Exploit_Methods_against_Ptmalloc_of_GLIBC
Q_Exploit_Hardening_Made_Easy
Return-Oriented_Programming_Systems_Languages_and_Applications
StackGuard_Automatic_Adaptive_Detection_and_Prevention_of_Buffer-Overflow_Attacks
Surgically_Returning_to_Randomized_libc
The_Art_Science_and_Engineering_of_Fuzzing_A_Survey
The_advanced_return-into-libc_exploits
Transparent_ROP_Exploit_Mitigation_using_Indirect_Branch_Tracing
Typestate-Guided_Fuzzer_for_Discovering_Use-after-Free_Vulnerabilities
Understanding_the_heap_by_breaking_it
Folders and files Name Name Last commit message
Last commit date
parent directory
View all files
You can’t perform that action at this time.