![](https://static37.tgcnt.ru/posts/_0/11/1109d4ba841a798bfff1f8c72fc48486.jpg)
Pitfalls of COM object activation
How to Use Windows Volume Shadow Copies in Digital Forensics
Shellcode: Obfuscation with Permutations
Relay Attack on WinReg RPC Client
bedevil: Dynamic Linker Patching
Exploit for Grafana arbitrary file-read (CVE-2024-9264)
chill kernel hacking for fun (week 38, debug stack crash)
How to Use Windows Volume Shadow Copies in Digital Forensics
Shellcode: Obfuscation with Permutations
Relay Attack on WinReg RPC Client
bedevil: Dynamic Linker Patching
Exploit for Grafana arbitrary file-read (CVE-2024-9264)
chill kernel hacking for fun (week 38, debug stack crash)