|
|
| | Heap Exploitation book (dhavalkapil.com) | | 1 point by mmoya on March 7, 2018 | past | |
| | FILE Structure Exploitation – 'vtable' check bypass (dhavalkapil.com) | | 2 points by vampire_dk on Jan 12, 2018 | past | |
| | Heap Exploitation (dhavalkapil.com) | | 3 points by samueladam on July 4, 2017 | past | |
| | Attacking the OAuth Protocol (dhavalkapil.com) | | 5 points by vampire_dk on Feb 17, 2017 | past | |
| | SQL Attack (Constraint-based) (dhavalkapil.com) | | 2 points by rohmanhakim on Jan 2, 2017 | past | |
| | SQL Attack (Constraint-based) (dhavalkapil.com) | | 1 point by maxt on Dec 28, 2016 | past | |
| | Yet Another SQL Attack – Constraint Based (dhavalkapil.com) | | 2 points by piyush8311 on Dec 25, 2016 | past | |
| | Shellcode Injection (dhavalkapil.com) | | 132 points by piyush8311 on Dec 27, 2015 | past | 16 comments | |
| | Transparently tunnel your IP traffic through ICMP echo and reply packets (dhavalkapil.com) | | 1 point by gulbrandr on Nov 15, 2015 | past | |
| | DNS Security – Different types of attacks concerning DNS and their mitigation (dhavalkapil.com) | | 1 point by vampire_dk on Sept 8, 2015 | past | |
| | Running remote scripts securely: xinetd and chroot (dhavalkapil.com) | | 1 point by vampire_dk on June 28, 2015 | past | |
| | Tutorial: Buffer overflow explained (dhavalkapil.com) | | 3 points by vampire_dk on June 28, 2015 | past | |
|

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact
|