Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Poisoning the Activation Cache to Elevate from Medium to High Integrity (coresecurity.com)
1 point by wslh on Sept 29, 2024 | past
Windows DWM Core Library Elevation of Privilege Vulnerability (CVE-2024-30051) (coresecurity.com)
2 points by wslh on Sept 6, 2024 | past
Core Security – Getting Fun with Frida – Turbo Talk – Ekoparty (2016) [pdf] (coresecurity.com)
2 points by peter_d_sherman on April 26, 2020 | past
Playing with NTLM relayed credentials during penetration testing (coresecurity.com)
1 point by wolframio on June 29, 2018 | past
Playing with Relayed Credentials (coresecurity.com)
2 points by wslh on June 28, 2018 | past
Quest KACE System Management Appliance Multiple Vulnerabilities (coresecurity.com)
1 point by vuln on June 1, 2018 | past
Trend Micro Email Encryption Gateway Multiple Vulnerabilities (coresecurity.com)
1 point by vuln on Feb 21, 2018 | past
Trend Micro Smart Protection OS Command Injection (coresecurity.com)
1 point by wslh on Aug 26, 2017 | past
Kerberos Delegation, SPNs and More (coresecurity.com)
1 point by based2 on March 8, 2017 | past
The Unpatched LSASS Remote Denial of Service (MS16-137) (coresecurity.com)
2 points by sjreese on Jan 20, 2017 | past
Abusing GDI for ring0 exploit primitives (coresecurity.com)
2 points by DiabloD3 on Jan 13, 2017 | past
Deactivate the BiOS Rootkit (2009) (coresecurity.com)
1 point by walterbell on Nov 14, 2016 | past
Abusing GDI for ring0 exploit primitives [pdf] (coresecurity.com)
2 points by brakmic on Nov 1, 2016 | past
How secure is Pokemon Go? (coresecurity.com)
1 point by wslh on July 20, 2016 | past
MS16-039 – Windows 10 64 bits Integer Overflow exploitation by using GDI objects (coresecurity.com)
3 points by DiabloD3 on June 29, 2016 | past
Windows 10 64 bits Integer Overflow exploitation by using GDI objects (coresecurity.com)
10 points by wslh on June 29, 2016 | past
Getting Physical: Extreme Abuse of Intel Based Paging Systems – Part 2 – Windows (coresecurity.com)
2 points by adamnemecek on June 21, 2016 | past
Getting Physical: Extreme Abuse of Intel Based Paging Systems – Part 2 – Windows (coresecurity.com)
2 points by n3mes1s on June 21, 2016 | past
Getting Physical: Abuse of Intel based Paging Systems – Part 1 (coresecurity.com)
27 points by DiabloD3 on May 11, 2016 | past
Exploiting Internet Explorer’s MS15-106, Part I: VBScript Filter Type Confusion (coresecurity.com)
2 points by wolframio on April 26, 2016 | past
Bypassing Control Flow Guard on Windows 8.1 Update 3 (coresecurity.com)
2 points by wslh on July 12, 2015 | past
CORE Labs Research Publications (coresecurity.com)
1 point by evandrix on July 4, 2015 | past
Analysis of Windows USB Descriptor Vulnerability (coresecurity.com)
24 points by 2510c39011c5 on Feb 28, 2015 | past
Sentinel 0-Day Attack Protection Tool for 32-bit Windows (GPL) (coresecurity.com)
1 point by wslh on Feb 4, 2014 | past | 2 comments
Insecure Programming by example (by gera) (coresecurity.com)
4 points by neur0mancer on Oct 5, 2013 | past
Broadcom Wifi firmware DoS with python proof of concept (coresecurity.com)
3 points by maceip on Oct 25, 2012 | past
Apple OS X Sandbox Predefined Profiles Bypass (coresecurity.com)
1 point by coreyrecvlohe on Nov 15, 2011 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: