BingSun
Search this site
Home
How to Survive the Hardware-assisted Control-flow Integrity Enforcement
JIT Spraying Never Dies - Bypass CFG By Leveraging WARP Shader JIT Spraying
Shellcodes are for the 99%
The Battle For Protected Memory
The Power of Data-Oriented Attacks: Bypassing Memory Mitigation Using Data-Only Exploitation Technique
Unearth Hidden Treasures In The Stack - Bypass CFG Via Stack Data Corruption
Sitemap
The Battle For Protected Memory
Č
Updating...
Ċ
The Battle For Protected Memory - Attack Read-only Memory Using Advanced Data-only Attack Technique (Part I).pdf
(2971k)
sun bing,
Dec 27, 2017, 6:23 PM
v.1
ď
Ċ
The Battle For Protected Memory - Attack Read-only Memory Using Advanced Data-only Attack Technique (Part II).pdf
(7103k)
sun bing,
Dec 29, 2017, 4:52 PM
v.1
ď
Ċ
争夺保护内存之战-使用高级纯数据利用技术攻击只读内存(上).pdf
(2925k)
sun bing,
Dec 27, 2017, 6:22 PM
v.1
ď
Ċ
争夺保护内存之战-使用高级纯数据利用技术攻击只读内存(下).pdf
(7358k)
sun bing,
Dec 29, 2017, 4:52 PM
v.1
ď
Comments