| | Poisoning the Activation Cache to Elevate from Medium to High Integrity (coresecurity.com) |
| 1 point by wslh on Sept 29, 2024 | past |
|
| | Windows DWM Core Library Elevation of Privilege Vulnerability (CVE-2024-30051) (coresecurity.com) |
| 2 points by wslh on Sept 6, 2024 | past |
|
| | Core Security – Getting Fun with Frida – Turbo Talk – Ekoparty (2016) [pdf] (coresecurity.com) |
| 2 points by peter_d_sherman on April 26, 2020 | past |
|
| | Playing with NTLM relayed credentials during penetration testing (coresecurity.com) |
| 1 point by wolframio on June 29, 2018 | past |
|
| | Playing with Relayed Credentials (coresecurity.com) |
| 2 points by wslh on June 28, 2018 | past |
|
| | Quest KACE System Management Appliance Multiple Vulnerabilities (coresecurity.com) |
| 1 point by vuln on June 1, 2018 | past |
|
| | Trend Micro Email Encryption Gateway Multiple Vulnerabilities (coresecurity.com) |
| 1 point by vuln on Feb 21, 2018 | past |
|
| | Trend Micro Smart Protection OS Command Injection (coresecurity.com) |
| 1 point by wslh on Aug 26, 2017 | past |
|
| | Kerberos Delegation, SPNs and More (coresecurity.com) |
| 1 point by based2 on March 8, 2017 | past |
|
| | The Unpatched LSASS Remote Denial of Service (MS16-137) (coresecurity.com) |
| 2 points by sjreese on Jan 20, 2017 | past |
|
| | Abusing GDI for ring0 exploit primitives (coresecurity.com) |
| 2 points by DiabloD3 on Jan 13, 2017 | past |
|
| | Deactivate the BiOS Rootkit (2009) (coresecurity.com) |
| 1 point by walterbell on Nov 14, 2016 | past |
|
| | Abusing GDI for ring0 exploit primitives [pdf] (coresecurity.com) |
| 2 points by brakmic on Nov 1, 2016 | past |
|
| | How secure is Pokemon Go? (coresecurity.com) |
| 1 point by wslh on July 20, 2016 | past |
|
| | MS16-039 – Windows 10 64 bits Integer Overflow exploitation by using GDI objects (coresecurity.com) |
| 3 points by DiabloD3 on June 29, 2016 | past |
|
| | Windows 10 64 bits Integer Overflow exploitation by using GDI objects (coresecurity.com) |
| 10 points by wslh on June 29, 2016 | past |
|
| | Getting Physical: Extreme Abuse of Intel Based Paging Systems – Part 2 – Windows (coresecurity.com) |
| 2 points by adamnemecek on June 21, 2016 | past |
|
| | Getting Physical: Extreme Abuse of Intel Based Paging Systems – Part 2 – Windows (coresecurity.com) |
| 2 points by n3mes1s on June 21, 2016 | past |
|
| | Getting Physical: Abuse of Intel based Paging Systems – Part 1 (coresecurity.com) |
| 27 points by DiabloD3 on May 11, 2016 | past |
|
| | Exploiting Internet Explorer’s MS15-106, Part I: VBScript Filter Type Confusion (coresecurity.com) |
| 2 points by wolframio on April 26, 2016 | past |
|
| | Bypassing Control Flow Guard on Windows 8.1 Update 3 (coresecurity.com) |
| 2 points by wslh on July 12, 2015 | past |
|
| | CORE Labs Research Publications (coresecurity.com) |
| 1 point by evandrix on July 4, 2015 | past |
|
| | Analysis of Windows USB Descriptor Vulnerability (coresecurity.com) |
| 24 points by 2510c39011c5 on Feb 28, 2015 | past |
|
| | Sentinel 0-Day Attack Protection Tool for 32-bit Windows (GPL) (coresecurity.com) |
| 1 point by wslh on Feb 4, 2014 | past | 2 comments |
|
| | Insecure Programming by example (by gera) (coresecurity.com) |
| 4 points by neur0mancer on Oct 5, 2013 | past |
|
| | Broadcom Wifi firmware DoS with python proof of concept (coresecurity.com) |
| 3 points by maceip on Oct 25, 2012 | past |
|
| | Apple OS X Sandbox Predefined Profiles Bypass (coresecurity.com) |
| 1 point by coreyrecvlohe on Nov 15, 2011 | past |
|