Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

codewhitesec.blogspot.com

code white | Blog

Get the latest updates from code white | Blog directly as they happen.

Follow now 88 followers

Latest posts

Last updated almost 2 years ago

Java Exploitation Restrictions in Modern JDK Times

about 2 years ago

Java deserialization gadgets have a long history in context of vulnerability research...

JMX Exploitation Revisited

about 2 years ago

The Java Management Extensions (JMX) are used by many if not all...

Attacks on Sysmon Revisited - SysmonEnte

over 2 years ago

In this blogpost we demonstrate an attack on the integrity of Sysmon...

Bypassing .NET Serialization Binders

almost 3 years ago

Serialization binders are often used to validate types specified in the serialized...

.NET Remoting Revisited

over 3 years ago

.NET Remoting is the built-in architecture for remote method invocation in .NET...

RCE in Citrix ShareFile Storage Zones Controller (CVE-2021-22941) – A Walk-Through

over 3 years ago

Citrix ShareFile Storage Zones Controller uses a fork of the third party...

About the Unsuccessful Quest for a Deserialization Gadget (or: How I found CVE-2021-21481)

almost 4 years ago

This blog post describes the research on SAP J2EE Engine 7.50 I...