Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Heap Exploitation book (dhavalkapil.com)
1 point by mmoya on March 7, 2018 | past
FILE Structure Exploitation – 'vtable' check bypass (dhavalkapil.com)
2 points by vampire_dk on Jan 12, 2018 | past
Heap Exploitation (dhavalkapil.com)
3 points by samueladam on July 4, 2017 | past
Attacking the OAuth Protocol (dhavalkapil.com)
5 points by vampire_dk on Feb 17, 2017 | past
SQL Attack (Constraint-based) (dhavalkapil.com)
2 points by rohmanhakim on Jan 2, 2017 | past
SQL Attack (Constraint-based) (dhavalkapil.com)
1 point by maxt on Dec 28, 2016 | past
Yet Another SQL Attack – Constraint Based (dhavalkapil.com)
2 points by piyush8311 on Dec 25, 2016 | past
Shellcode Injection (dhavalkapil.com)
132 points by piyush8311 on Dec 27, 2015 | past | 16 comments
Transparently tunnel your IP traffic through ICMP echo and reply packets (dhavalkapil.com)
1 point by gulbrandr on Nov 15, 2015 | past
DNS Security – Different types of attacks concerning DNS and their mitigation (dhavalkapil.com)
1 point by vampire_dk on Sept 8, 2015 | past
Running remote scripts securely: xinetd and chroot (dhavalkapil.com)
1 point by vampire_dk on June 28, 2015 | past
Tutorial: Buffer overflow explained (dhavalkapil.com)
3 points by vampire_dk on June 28, 2015 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: