Skip to main content

Explore our questions

0 votes
2 answers
361 views

How to return to main after performing stack buffer overflow

0 votes
0 answers
10 views

Genymotion with burpsuite proxy setup failed

8 votes
3 answers
2k views

Long-validity SSL certificates -- for non-browser X.509 client certificate authentication

0 votes
1 answer
569 views

Does Forcepoint Security Manager 8.5 (WebSense) allows SFTP petitions?

0 votes
1 answer
4k views

Adding Payload to URL-based SQL Injection: Seeking Guidance and Best Practices

1 vote
3 answers
1k views

Microsoft DP API and its keys

1 vote
1 answer
271 views

Secure Offline Login and Data Encryption with PBKDF2 and AES-256

0 votes
2 answers
212 views

How do embedded systems protect encryption keys when no user authentication is possible at startup?

0 votes
1 answer
376 views

Is there antivirus software for iphone model 6s?

20 votes
8 answers
4k views

Plausibility of a write-only hack of an employee database

2 votes
0 answers
20 views

Kernel panic during ROP chain: GDB stepping mismatch and unexpected register state

3 votes
2 answers
4k views

Windows Kerberos Pre-Auth Failed (4771)

0 votes
1 answer
452 views

How does Windows Defender for Mac block applications and how can people evade the block?

1 vote
2 answers
761 views

Is there a way to modify the value of a session token with HttpOnly flag set in this scenario?

Browse more Questions