Hide filtersShow filters × Close ArticlesNovember 13, 2024Fault Injection – Down the Rabbit Holeby Maurizio Agazzini VulnerabilitiesArticlesOctober 30, 2024An analysis of the Keycloak authentication systemby Maurizio Agazzini ExploitsVulnerabilitiesOctober 9, 2024Exploiting AMD atdcm64a.sys arbitrary pointer dereference – Part 3by Alessandro Iandoli ExploitsVulnerabilitiesOctober 2, 2024Exploiting AMD atdcm64a.sys arbitrary pointer dereference – Part 2by Alessandro Iandoli ExploitsVulnerabilitiesSeptember 25, 2024Exploiting AMD atdcm64a.sys arbitrary pointer dereference – Part 1by Alessandro Iandoli ArticlesToolsSeptember 3, 2024Learning Rust for fun and backdoo-rsby Marco Ivaldi ArticlesToolsJuly 30, 2024Extending Burp Suite for fun and profit – The Montoya way – Part 6by Federico Dotta ArticlesToolsJune 19, 2024Extending Burp Suite for fun and profit – The Montoya way – Part 5by Federico Dotta VulnerabilitiesMay 28, 2024Multiple vulnerabilities in Eclipse ThreadXby Marco Ivaldi