2022-06-14 | Pwn2Own 2021 Canon ImageCLASS MF644Cdw writeup | exploitation ‧ Nicolas "NK" Devillers & Jean-Romain "JRomainG" Garnier & Raphaël "_trou_" Rigo | |
2022-05-02 | Competing in Pwn2Own 2021 Austin: Icarus at the Zenith | exploitation ‧ Axel "0vercl0k" Souchet | |
2021-08-02 | Building a new snapshot fuzzer & fuzzing IDA | misc ‧ Axel "0vercl0k" Souchet | |
2021-04-15 | Reverse-engineering tcpip.sys: mechanics of a packet of the death (CVE-2021-24086) | reverse-engineering ‧ Axel "0vercl0k" Souchet | |
2021-03-17 | A journey into IonMonkey: root-causing CVE-2019-9810. | exploitation ‧ Axel "0vercl0k" Souchet | |
2021-03-17 | Modern attacks on the Chrome browser : optimizations and deoptimizations | exploitation ‧ Jeremy "@__x86" Fetiveau | |
2019-07-09 | A journey into IonMonkey: root-causing CVE-2019-9810. | ion ‧ Axel "0vercl0k" Souchet | |
2019-07-09 | Circumventing Chrome's hardening of typer bugs | v8 ‧ Jeremy "__x86" Fetiveau | |
2019-07-09 | Introduction to TurboFan | v8 ‧ Jeremy "__x86" Fetiveau | |
2019-07-09 | Introduction to SpiderMonkey exploitation. | spidermonkey ‧ Axel "0vercl0k" Souchet | |
2019-07-09 | CVE-2017-2446 or JSC::JSGlobalObject::isHavingABadTime. | JavascriptCore ‧ yrp | |
2019-07-09 | Breaking ledgerctf's AES white-box challenge | reverse-engineering ‧ Axel "0vercl0k" Souchet | |
2019-07-09 | beVX challenge on the operation table | reverse-engineering ‧ Axel "0vercl0k" Souchet | |
2019-07-09 | Debugger data model, Javascript & x64 exception handling | debugging ‧ Axel "0vercl0k" Souchet | |
2019-07-09 | Binary rewriting with syzygy, Pt. I | binary rewriting ‧ Axel "0vercl0k" Souchet | |
2019-07-09 | happy unikernels | unikernel ‧ yrp | |
2019-07-09 | Token capture via an llvm-based analysis pass | fuzzing ‧ Axel "0vercl0k" Souchet | |
2019-07-09 | Keygenning with KLEE | reverse-engineering ‧ Michele "brt_device" Bertasi | |
2019-07-09 | Spotlight on an unprotected AES128 white-box implementation | obfuscation ‧ Axel "0vercl0k" Souchet | |
2019-07-09 | Taming a wild nanomite-protected MIPS binary with symbolic execution: No Such Crackme | reverse-engineering ‧ Axel "0vercl0k" Souchet & Emilien "tr4nce" Girault | |
2019-07-09 | Dissection of Quarkslab's 2014 security challenge | python ‧ Axel "0vercl0k" Souchet | |
2019-07-09 | Corrupting the ARM Exception Vector Table | exploitation ‧ Amat "acez" Cama | |
2019-07-09 | Deep dive into Python's VM: Story of LOAD_CONST bug | python ‧ Axel "0vercl0k" Souchet | |
2019-07-09 | First dip into the kernel pool : MS10-058 | reverse-engineering ‧ Jeremy "__x86" Fetiveau | |
2019-07-09 | Having a look at the Windows' User/Kernel exceptions dispatcher | coding ‧ Axel "0vercl0k" Souchet | |
2019-07-09 | Breaking Kryptonite's obfuscation: a static analysis approach relying on symbolic execution | reverse-engineering ‧ Axel "0vercl0k" Souchet | |
2019-07-09 | Pinpointing heap-related issues: OllyDbg2 off-by-one story | reverse-engineering ‧ Axel "0vercl0k" Souchet | |
2019-07-09 | Some thoughts about code-coverage measurement with Pin | reverse-engineering ‧ Axel "0vercl0k" Souchet | |
2019-07-09 | Regular expressions obfuscation under the microscope | reverse-engineering ‧ Axel "0vercl0k" Souchet | |
2019-05-09 | Circumventing Chrome's hardening of typer bugs | exploitation ‧ Jeremy "__x86" Fetiveau | |
2019-05-08 | Introduction to TurboFan | exploitation ‧ Jeremy "__x86" Fetiveau | |
2019-05-08 | Introduction to SpiderMonkey exploitation. | exploitation ‧ Axel "0vercl0k" Souchet | |
2019-05-08 | CVE-2017-2446 or JSC::JSGlobalObject::isHavingABadTime. | exploitation ‧ yrp | |
2019-05-08 | Breaking ledgerctf's AES white-box challenge | reverse-engineering ‧ Axel "0vercl0k" Souchet | |
2019-05-08 | beVX challenge on the operation table | reverse-engineering ‧ Axel "0vercl0k" Souchet | |
2019-05-08 | Debugger data model, Javascript & x64 exception handling | debugging ‧ Axel "0vercl0k" Souchet | |
2019-05-08 | Binary rewriting with syzygy, Pt. I | misc ‧ Axel "0vercl0k" Souchet | |
2019-05-08 | happy unikernels | exploitation ‧ yrp | |
2019-05-08 | Token capture via an llvm-based analysis pass | misc ‧ Axel "0vercl0k" Souchet | |
2019-05-08 | Keygenning with KLEE | reverse-engineering ‧ Michele "brt_device" Bertasi | |
2019-05-08 | Spotlight on an unprotected AES128 white-box implementation | obfuscation ‧ Axel "0vercl0k" Souchet | |
2019-05-08 | Taming a wild nanomite-protected MIPS binary with symbolic execution: No Such Crackme | reverse-engineering ‧ Axel "0vercl0k" Souchet & Emilien "tr4nce" Girault | |
2019-05-08 | Dissection of Quarkslab's 2014 security challenge | reverse-engineering ‧ Axel "0vercl0k" Souchet | |
2019-05-08 | Corrupting the ARM Exception Vector Table | exploitation ‧ Amat "acez" Cama | |
2019-05-08 | Deep dive into Python's VM: Story of LOAD_CONST bug | exploitation ‧ Axel "0vercl0k" Souchet | |
2019-05-08 | First dip into the kernel pool : MS10-058 | exploitation ‧ Jeremy "__x86" Fetiveau | |
2019-05-08 | Having a look at the Windows' User/Kernel exceptions dispatcher | reverse-engineering ‧ Axel "0vercl0k" Souchet | |
2019-05-08 | Breaking Kryptonite's obfuscation: a static analysis approach relying on symbolic execution | reverse-engineering ‧ Axel "0vercl0k" Souchet | |
2019-05-08 | Pinpointing heap-related issues: OllyDbg2 off-by-one story | debugging ‧ Axel "0vercl0k" Souchet | |
2019-05-08 | Some thoughts about code-coverage measurement with Pin | misc ‧ Axel "0vercl0k" Souchet | |
2019-05-08 | Regular expressions obfuscation under the microscope | obfuscation ‧ Axel "0vercl0k" Souchet | |
匿名用户只展示最新 100 条榜单历史,更多历史数据请登录后查看,支持时光机按天筛选