VS-Labs
![Exploit with VS- Labs. CVE-2023-3439: Analyzing UAF Vulnerability in Linux MCTP](https://versprite.com/wp-content/uploads/2023/09/Linux-1024x576.png)
Security Research
Exploit with VS- Labs. CVE-2023-3439: Analyzing UAF Vulnerability in Linux MCTP
![AFD.sys – Primitives in The Pocket | Integer Shenanigans](https://versprite.com/wp-content/uploads/2023/07/Primitives-in-The-Pocket-AFD.sys_-1024x576.png)
Security Research
AFD.sys – Primitives in The Pocket | Integer Shenanigans
![Printer Spooler Bug Research](https://versprite.com/wp-content/uploads/2022/12/print-spooler-1-1024x576.png)
Security Research, Threat & Vulnerability Management
Printer Spooler Bug Research
![Windows Kernel Drive Vulnerability Research: CVE-2020-17087](https://versprite.com/wp-content/uploads/2022/12/Windows-kernel-1024x576.png)
Security Research, Threat & Vulnerability Management
Windows Kernel Drive Vulnerability Research: CVE-2020-17087
![Exploiting Smart Cars Using SDR](https://versprite.com/wp-content/uploads/2022/11/Exploiting-Smart-Cars-1024x576.png)
Security Research
Exploiting Smart Cars Using SDR
![Exploring Android Vulnerabilities and Binder: Part II](https://versprite.com/wp-content/uploads/2022/11/Android-Vulnerability-1-1-1024x576.png)
Security Research
Exploring Android Vulnerabilities and Binder: Part II
![Exploring Android Vulnerabilities and Binder: Part I](https://versprite.com/wp-content/uploads/2022/11/Android-Vulnerability-1-1-1024x576.png)
Security Research
Exploring Android Vulnerabilities and Binder: Part I
![Part 6: Comprehensive Research of Linux Operating System](https://versprite.com/wp-content/uploads/2022/06/Research-of-The-Linux-1-1024x576.png)
Application Security, Security Research
Part 6: Comprehensive Research of Linux Operating System
![Part 5: Comprehensive Research of Linux Operating System](https://versprite.com/wp-content/uploads/2022/06/Linux-Operating-System-1024x576.png)
Application Security, Security Research
Part 5: Comprehensive Research of Linux Operating System
![Part 4: Comprehensive Research of Linux Operating System](https://versprite.com/wp-content/uploads/2022/05/Linux-System-1024x576.png)
Application Security, Security Research
Part 4: Comprehensive Research of Linux Operating System
![Part 3: Comprehensive Research of Linux Operating System](https://versprite.com/wp-content/uploads/2022/05/Linux-vulnerabilities-1024x576.png)
Application Security, Security Research
Part 3: Comprehensive Research of Linux Operating System
![Part 2: Comprehensive Research of Linux Operating System](https://versprite.com/wp-content/uploads/2022/05/linux-device-drivers-1024x576.png)
Application Security, Security Research
Part 2: Comprehensive Research of Linux Operating System
![Comprehensive Research of Linux Operating System](https://versprite.com/wp-content/uploads/2022/05/Linux-Operating-System-1-1024x576.png)
Application Security, Security Research
Comprehensive Research of Linux Operating System
![Security Vulnerability Classes in Popular Programming Languages](https://versprite.com/wp-content/uploads/2021/12/vulnerabilities-in-programming-1024x576.png)
Security Research
Security Vulnerability Classes in Popular Programming Languages
![Google Fuchsia OS Sets a New Standard for Operating System Security](https://versprite.com/wp-content/uploads/2021/07/Fuchsia-1024x576.png)
Security Research