How to apt-get from the internal network: remote sshd with kneesocks
CRYPT+YOU, UNDERSTAND TODAY!
ROP Illmatic: Exploring Universal ROP on glibc x86-64 (ja)
Making a Proxy for Fun and Profit
proxy2: HTTPS pins and needles
Why is Security Management So Hard?
HTTPプロクシライブラリproxy2の設計と実装
Abusing Interrupts for Reliable Windows Kernel Exploitation (ja)
Protecting Passwords
Can We Prevent Use-after-free Attacks?