VS-Labs

Security Awareness, Security Research
Slipping Malware Through Microsoft Security Checks

Security Research
Exploit with VS- Labs. CVE-2023-3439: Analyzing UAF Vulnerability in Linux MCTP

Security Research
AFD.sys – Primitives in The Pocket | Integer Shenanigans

Security Research, Threat & Vulnerability Management
Printer Spooler Bug Research

Security Research, Threat & Vulnerability Management
Windows Kernel Drive Vulnerability Research: CVE-2020-17087

Security Research
Exploiting Smart Cars Using SDR

Security Research
Exploring Android Vulnerabilities and Binder: Part II

Security Research
Exploring Android Vulnerabilities and Binder: Part I

Application Security, Security Research
Part 6: Comprehensive Research of Linux Operating System

Application Security, Security Research
Part 5: Comprehensive Research of Linux Operating System

Application Security, Security Research
Part 4: Comprehensive Research of Linux Operating System

Application Security, Security Research
Part 3: Comprehensive Research of Linux Operating System

Application Security, Security Research
Part 2: Comprehensive Research of Linux Operating System

Application Security, Security Research
Comprehensive Research of Linux Operating System

Security Research