Hide filtersShow filters Clear allExploitsTools × Close ToolsArticlesDecember 10, 2025Extending Burp Suite for fun and profit – The Montoya way – Part 9by Federico Dotta ArticlesExploitsNovember 11, 2025Groovy Template Engine Exploitation – Notes from a real case scenario, part 2by Gianluca Baldi ArticlesToolsOctober 28, 2025Brida 0.6 released!by Federico Dotta ArticlesToolsOctober 14, 2025Streamlining Vulnerability Research with the idalib Rust Bindings for IDA 9.2by Marco Ivaldi VulnerabilitiesExploitsApril 23, 2025Local privilege escalation on Zyxel USG FLEX H Series (CVE-2025-1731)by Marco Ivaldi ToolsArticlesApril 15, 2025Aiding reverse engineering with Rust and a local LLMby Marco Ivaldi ToolsArticlesFebruary 25, 2025Streamlining vulnerability research with IDA Pro and Rustby Marco Ivaldi VulnerabilitiesExploitsJanuary 29, 2025CVE-2024-49138 Windows CLFS heap-based buffer overflow analysis – Part 2by Alessandro Iandoli ExploitsVulnerabilitiesJanuary 29, 2025CVE-2024-49138 Windows CLFS heap-based buffer overflow analysis – Part 1by Alessandro Iandoli