Twenty Year Anniversary
Showing 1 - 3 of 3 RSS Feed

UNINFORMED

Uninformed is a technical outlet for research in areas pertaining to security technologies, reverse engineering, and lowlevel programming. The goal, as the name implies, is to act as a medium for informing the uninformed. The research presented here is simply an example of the evolutionary thought that affects all academic and professional disciplines.
uninformed-10.tgz
Posted Oct 13, 2008
Authored by Matt Miller, H D Moore, Skywing, uninformed, mxatone | Site uninformed.org

Uninformed is pleased to announce the release of its tenth volume which is composed of 4 articles: Can you find me now? Unlocking the Verizon Wireless xv6800 (HTC Titan), Using dual-mappings to evade automated unpacker, Analyzing local privilege escalations in win32k, and Exploiting Tomorrow's Internet Today: Penetration testing with IPv6.

tags | local
MD5 | 59903dc059b514cf6bd0e37a30d6eac3
uninformed-vol9.tgz
Posted Jan 28, 2008
Authored by Matt Miller, warlord, I)ruid, Skywing, uninformed | Site uninformed.org

Uninformed is pleased to announce the release of its ninth volume. This volume includes 4 articles on reverse engineering and exploitation technology. These articles include - Engineering in Reverse: An Objective Analysis of the Lockdown Protection System for Battle.net. Exploitation Technology: ActiveX - Active Exploitation. Exploitation Technology: Context-keyed Payload Encoding. Exploitation Technology: Improving Software Security Analysis using Exploitation Properties.

tags | activex
MD5 | c767de0e1c78ea8126020eebdf39c862
uninformed-vol6.tgz
Posted Jan 16, 2007
Authored by Matt Miller, H D Moore, Johnny Cache, Skywing, uninformed | Site uninformed.org

Uninformed is pleased to announce the release of its sixth volume. This volume includes 3 articles on reverse engineering and exploitation technology. These articles include - Engineering in Reverse: Subverting PatchGuard Version 2, Engineering in Reverse: Locreate: An Anagram for Relocate, Exploitation Technology: Exploiting 802.11 Wireless Driver Vulnerabilities on Windows. PDFs of all articles and related code are included in this tarball.

tags | vulnerability
systems | windows
MD5 | 6387aaa6e7cc43930494506675363d7a
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
Security Review: A Counterfeit, $100 iPhone X
Posted Jul 19, 2018

tags | headline, malware, phone, china, fraud, apple
Roblox Blames Gang Rape On Hacker Adding Code To Game
Posted Jul 19, 2018

tags | headline, hacker
Cisco Patches Critical Vulnerabilities In Policy Suite
Posted Jul 19, 2018

tags | headline, flaw, patch, cisco
Movistar Exposes Call Records Details Of Users
Posted Jul 19, 2018

tags | headline, privacy, phone, data loss, flaw, spain
The SIM Hijackers
Posted Jul 19, 2018

tags | headline, hacker, phone, fraud, password
Thousands Of US Voters' Data Exposed By Robocall Firm
Posted Jul 19, 2018

tags | headline, hacker, government, privacy, usa, data loss
Password Stealing Spying Malware Targets Ukrainian Government
Posted Jul 19, 2018

tags | headline, government, malware, cyberwar, spyware
PayPal's Venmo Found Leaking Transaction Details
Posted Jul 19, 2018

tags | headline, privacy, bank, data loss, flaw, paypal
007 Code Helps Stop Spectre Exploits Before They Exist
Posted Jul 17, 2018

tags | headline, flaw, patch, intel
Trump Wants To Work With Russia On Infosec. Security Experts: Lol No.
Posted Jul 17, 2018

tags | headline, hacker, government, usa, russia, fraud, cyberwar, spyware
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close