Personal Information
Occupation
Security Consultant
Industry
Technology / Software / Internet
Website
adamantium.persiangig.com
Tags
exploit
linux
kernel
aslr
glibc protection
gcc protection
lbr
msr
defense
protection
security
kprobe
jprobe
jop
rop
control flow integrity
cfi
basic c++
g++
deitel
deitel & deitel
how to
programming
cpp
c++
exic-shield
linux c programming
kernel module
rdmsr
wrmsr
last branch record
des
الگوریتم des
data encryption system
address space layout randomization
linux protection
aslr analysis
See more
- Presentations
- Documents
- Infographics
OWASP AppSecCali 2015 - Marshalling Pickles
Christopher Frohoff
•
9 years ago
Unified Extensible Firmware Interface (UEFI)
k33a
•
10 years ago
Packet sniffing in switched LANs
Ishraq Al Fataftah
•
11 years ago
ORM2Pwn: Exploiting injections in Hibernate ORM
Mikhail Egorov
•
8 years ago
Linux Profiling at Netflix
Brendan Gregg
•
9 years ago