Techniques

TTPs across the kill chain (recon → persistence) and exploit development (ROP, UAF, type confusion, heap grooming).

15 pages in this category.