
exploitation
Vulnerability research and ActiveX controller exploitation
This post is technical and was written a long time ago. It covers vulnerability research topic and if you do not understand, don’t push it, check my easier other posts instead! Introduction This is probably the longest write-up you’ll see on this blog. The reason is simple: I