Skip to main content

control.rip

Posts

Notes: Exploiting Clam AntiVirus in a mail server environment

Leveraging glibc in exploitation - Part 4: An example

Leveraging glibc in exploitation - Part 3: Defenses

Leveraging glibc in exploitation - Part 2: Fingerprinting glibc

Leveraging glibc in exploitation - Part 1: What is glibc?

From strings to riches: Finding a user-assisted LPE in the wild

Compile time options in Go applications

Decompiling .NET software on Windows via SSH

Hello World