×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
inaz2 documents
Technology
Sniffing BitTorrent DHT ~人はBTで何を落とすのか~
Technology
How to apt-get from the internal network: remote sshd with kneesocks
Technology
CRYPT+YOU, UNDERSTAND TODAY!
Technology
ROP Illmatic: Exploring Universal ROP on glibc x86-64 (ja)
Technology
ROP Illmatic: Exploring Universal ROP on glibc x86-64 (en)
Technology
Making a Proxy for Fun and Profit
Technology
proxy2: HTTPS pins and needles
Technology
Self Introduction & The Story that I Tried to Make Sayonara ROP Chain in Linux
Technology
HTTPプロクシライブラリproxy2の設計と実装
Presentations & Public Speaking
Why is Security Management So Hard?
Technology
WinDbg Primer
Technology
Abusing Interrupts for Reliable Windows Kernel Exploitation (ja)
Technology
Abusing Interrupts for Reliable Windows Kernel Exploitation (en)
Technology
Protecting Passwords
Technology
Can We Prevent Use-after-free Attacks?