Moniker Magic: Running Scripts Directly in Microsoft Office |
2017 SyScan360
|
Bypassing Memory Mitigations Using Data-Only Exploitation Techniques (Part II) |
HITBSecConf2017 – Amsterdam
|
The Power of Data-Oriented Attacks: Bypassing Memory Mitigation Using Data-Only Exploitation Techniques |
Black Hat Asia 2017
|
Attacking Interoperability - An OLE Edition |
Black Hat USA 2015
|
Shellcodes are for the 99% |
CanSecWest 2018
|