Submit Search
Upload
DbiFuzz framework #ZeroNights E.0x03 slides
•
2 likes
•
1,567 views
P
Peter Hlavaty
Follow
Report
Share
Report
Share
1 of 90
Download now
Download to read offline
Recommended
Reliable Windows Heap Exploits
Reliable Windows Heap Exploits
amiable_indian
Racing with Droids
Racing with Droids
Peter Hlavaty
Power of linked list
Power of linked list
Peter Hlavaty
How2heap
How2heap
Seonghwan Cho
Attacking the Webkit heap [Or how to write Safari exploits]
Attacking the Webkit heap [Or how to write Safari exploits]
Seguridad Apple
Exploit techniques and mitigation
Exploit techniques and mitigation
Yaniv Shani
How Safe is your Link ?
How Safe is your Link ?
Peter Hlavaty
You didnt see it’s coming? "Dawn of hardened Windows Kernel"
You didnt see it’s coming? "Dawn of hardened Windows Kernel"
Peter Hlavaty
Recommended
Reliable Windows Heap Exploits
Reliable Windows Heap Exploits
amiable_indian
Racing with Droids
Racing with Droids
Peter Hlavaty
Power of linked list
Power of linked list
Peter Hlavaty
How2heap
How2heap
Seonghwan Cho
Attacking the Webkit heap [Or how to write Safari exploits]
Attacking the Webkit heap [Or how to write Safari exploits]
Seguridad Apple
Exploit techniques and mitigation
Exploit techniques and mitigation
Yaniv Shani
How Safe is your Link ?
How Safe is your Link ?
Peter Hlavaty
You didnt see it’s coming? "Dawn of hardened Windows Kernel"
You didnt see it’s coming? "Dawn of hardened Windows Kernel"
Peter Hlavaty
Security research over Windows #defcon china
Security research over Windows #defcon china
Peter Hlavaty
DeathNote of Microsoft Windows Kernel
DeathNote of Microsoft Windows Kernel
Peter Hlavaty
Rainbow Over the Windows: More Colors Than You Could Expect
Rainbow Over the Windows: More Colors Than You Could Expect
Peter Hlavaty
Ice Age melting down: Intel features considered usefull!
Ice Age melting down: Intel features considered usefull!
Peter Hlavaty
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
Peter Hlavaty
When is something overflowing
When is something overflowing
Peter Hlavaty
Software Security : From school to reality and back!
Software Security : From school to reality and back!
Peter Hlavaty
Hacking - high school intro
Hacking - high school intro
Peter Hlavaty
Guardians of your CODE
Guardians of your CODE
Peter Hlavaty
Back to the CORE
Back to the CORE
Peter Hlavaty
Vulnerability desing patterns
Vulnerability desing patterns
Peter Hlavaty
Attack on the Core
Attack on the Core
Peter Hlavaty
More Related Content
More from Peter Hlavaty
Security research over Windows #defcon china
Security research over Windows #defcon china
Peter Hlavaty
DeathNote of Microsoft Windows Kernel
DeathNote of Microsoft Windows Kernel
Peter Hlavaty
Rainbow Over the Windows: More Colors Than You Could Expect
Rainbow Over the Windows: More Colors Than You Could Expect
Peter Hlavaty
Ice Age melting down: Intel features considered usefull!
Ice Age melting down: Intel features considered usefull!
Peter Hlavaty
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
Peter Hlavaty
When is something overflowing
When is something overflowing
Peter Hlavaty
Software Security : From school to reality and back!
Software Security : From school to reality and back!
Peter Hlavaty
Hacking - high school intro
Hacking - high school intro
Peter Hlavaty
Guardians of your CODE
Guardians of your CODE
Peter Hlavaty
Back to the CORE
Back to the CORE
Peter Hlavaty
Vulnerability desing patterns
Vulnerability desing patterns
Peter Hlavaty
Attack on the Core
Attack on the Core
Peter Hlavaty
More from Peter Hlavaty
(12)
Security research over Windows #defcon china
Security research over Windows #defcon china
DeathNote of Microsoft Windows Kernel
DeathNote of Microsoft Windows Kernel
Rainbow Over the Windows: More Colors Than You Could Expect
Rainbow Over the Windows: More Colors Than You Could Expect
Ice Age melting down: Intel features considered usefull!
Ice Age melting down: Intel features considered usefull!
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
When is something overflowing
When is something overflowing
Software Security : From school to reality and back!
Software Security : From school to reality and back!
Hacking - high school intro
Hacking - high school intro
Guardians of your CODE
Guardians of your CODE
Back to the CORE
Back to the CORE
Vulnerability desing patterns
Vulnerability desing patterns
Attack on the Core
Attack on the Core
Download now