Aggregator
Oracle Forensics Part 4: Live Response
1 year 9 months ago
Oracle Forensics Part 1: Dissecting the Redo Logs
1 year 9 months ago
Oracle Forensics Part 2: Locating Dropped Objects
1 year 9 months ago
Oracle 11g TNS listener remote Null Pointer Dereference
1 year 9 months ago
Oracle E-Business Suite Pre-Auth SQLi with DBA Privileges
1 year 9 months ago
Oracle 11g TNS listener remote Invalid Pointer Read
1 year 9 months ago
Optimizing Pairing-Based Cryptography: Montgomery Multiplication in Assembly
1 year 9 months ago
Optimum Routers: Researching Managed Routers
1 year 9 months ago
Open Banking: Security considerations & potential risks
1 year 9 months ago
Optimizing Pairing-Based Cryptography: Montgomery Arithmetic in Rust
1 year 9 months ago
On the Use of Pedersen Commitments for Confidential Payments
1 year 9 months ago
Online Casino Roulette – A guideline for penetration testers and security researchers
1 year 9 months ago
On Linux’s Random Number Generation
1 year 9 months ago
On Multiplications with Unsaturated Limbs
1 year 9 months ago
On the malicious use of large language models like GPT-3
1 year 9 months ago
NX Server for Linux Arbitrary Files can be read with root privileges
1 year 9 months ago
OffensiveCon 2023 – Exploit Engineering – Attacking the Linux Kernel
1 year 9 months ago
Non-stack Based Exploitation of Buffer Overrun Vulnerabilities on Windows NT 2000 XP
1 year 9 months ago
North Korea’s Lazarus: their initial access trade-craft using social media and social engineering
1 year 9 months ago