Tags
- android 10
- jni 6
- binary exploitation 5
- bytecode 4
- exploitation 4
- e²va 4
- kernel 4
- forensics 3
- linux 3
- frida 2
- heap exploitation 2
- lpe 2
- memory leak 2
- network 2
- scudo 2
- .net 1
- adversary emulation 1
- binary analysis 1
- bpf 1
- btf 1
- buffer overflow 1
- caldera 1
- code injection 1
- cybersecurity 1
- damnvulnerableapp 1
- debugging 1
- dynamic analysis 1
- ebpf 1
- elf 1
- emulation 1
- firmware reverse engineering 1
- fuzzing 1
- machine code detection 1
- malware 1
- n-gram distributions 1
- page cache 1
- pipe 1
- powershell 1
- processor architecture detection 1
- rootkit 1
- scriptblocklogging 1
- side channel attack 1
- siem 1
- sigma 1
- sockets 1
- splice 1
- threatdetection 1
- timing attack 1
- tls 1
- tls decryption 1
- use after free 1
- win7 1
- windows 1