TCache exploitation primer video: https://www.youtube.com/watch?v=PK-0EENLF_Y #vulndev
tcache - tcache exploitation, explained in details.

YouTube
Save $400 on our summer courses this week, covering subjects including #reversing, #vulndev #malware, and more. Just use the code DD24MEMDAY at the checkout. https://ringzer0.training/ringzer0-doubledown24-training-lineup/
Ringzer0 DOUBLEDOWN24 Trainer Lineup

All of Ringzer0's DOUBLEDOWN24 Las Vegas virtual and in-person training courses in one place.

Ringzer0
Nice Windows Kernel #vulndev exploitation tutorial series: https://rootkits.xyz/blog/2017/06/kernel-setting-up/
Windows Kernel Exploitation Tutorial Part 1: Setting up the Environment - rootkit

Intro Recently, I had the pleasure to attend the training on Windows Kernel Exploitation at nullcon by the HackSysTeam. The training was well executed, and I got the intro into the world of kernel. But, as you know, nobody could teach you internals about Kernel Exploitation in a couple of days. So I thought of […]

rootkit
What is a good example vulnerability that I could use to write a "How To Write An Exploit" style tutorial?
#exploitdev #xdev #vulndev
Complete free university course materials on program analysis, featuring symbolic execution. Includes lecture notes, slides, exercises, solutions and videos: https://software-lab.org/teaching/winter2020/pa/ #reversing #vulndev
Program Analysis - Software Lab - Department of Computer Science - University of Stuttgart

Symbolic Triage: Making the Best of a Good Situation — Atredis Partners

Symbolic Execution can get a bad rap. Generic symbex tools have a hard time proving their worth when confronted with a sufficiently complex target. However, I have found symbolic execution can be very helpful in certain targeted situations. One of those situations is when triaging a large number of

Atredis Partners

I’m really proud of the @hnsec blog!

We published articles about #web and #mobile #appsec, #IoT, #redteaming, #vulndev, #codereview

In a bit more than a couple of years of activity that’s a lot in my opinion. And we have more to come soon!

Well done, #hnsecurity team 💚

https://security.humanativaspa.it/

hn security

Offensive Security Specialists

hn security

Did you know that #Diaphora detects patch diffing sessions and tries to help finding where vulnerabilities were fixed? Here are some examples for CVE-2020-1350 and CVE-2023-28231.

#patchdiffing #binarydiffing #bindiffing #vulnerabilityresearch #vulndev

I’m in Vegas all week for #BlackHat2023 and #DEFCON
Hit me up if you’re around and want to chat #cybersecurity #vulndev #exploits etc.

I know nobody gives a fuck, but this is my next research topic for this year: Finding #bugs & #vulnerabilities by #diffing binaries against sources. It sounds much harder than it actually is.

#ProgramDiffing #VulnDev #VulnResearch #VulnerabilityDevelopment #VulnerabilityResearch #ReverseEngineering
#Compilers #CompilerOptimizations #CompilersBugs #Miscompilations