Payload Already Inside: Data Re-Use for ROP exploits
Aleatory Persistent Threat
Hacking Java Clients
Harder, Better, Faster, Stronger: Semi-Auto Vulnerability Research
SAP Backdoors: A Ghost at the Heart of Your Business