Maven compilation error

After downloading and compiling the following Telegram Bot using “mvn compile -X -e“:
The following maven compilation error has puzzled me:
[INFO] -------------------------------------------------------------
[ERROR] COMPILATION ERROR :
[INFO] -------------------------------------------------------------
[ERROR] Source option 5 is no longer supported. Use 8 or later.
[ERROR] Target option 5 is no longer supported. Use 8 or later.
[INFO] 2 errors
[INFO] -------------------------------------------------------------
[INFO] ------------------------------------------------------------------------
[INFO] BUILD FAILURE
[INFO] ------------------------------------------------------------------------
[INFO] Total time:  0.586 s
[INFO] Finished at: 2024-04-29T21:59:38+08:00
[INFO] ------------------------------------------------------------------------
[ERROR] Failed to execute goal org.apache.maven.plugins:maven-compiler-plugin:3.1:compile (default-compile) on project zauredu_bot: Compilation failure: Compilation failure:
[ERROR] Source option 5 is no longer supported. Use 8 or later.
[ERROR] Target option 5 is no longer supported. Use 8 or later.
....

Compilation failure
    at org.apache.maven.lifecycle.internal.MojoExecutor.execute (MojoExecutor.java:215)
    at org.apache.maven.lifecycle.internal.MojoExecutor.execute (MojoExecutor.java:156)
    at org.apache.maven.lifecycle.internal.MojoExecutor.execute (MojoExecutor.java:148)
    at org.apache.maven.lifecycle.internal.LifecycleModuleBuilder.buildProject (LifecycleModuleBuilder.java:117)
    at org.apache.maven.lifecycle.internal.LifecycleModuleBuilder.buildProject (LifecycleModuleBuilder.java:81)
    at org.apache.maven.lifecycle.internal.builder.singlethreaded.SingleThreadedBuilder.build (SingleThreadedBuilder.java:56)
    at org.apache.maven.lifecycle.internal.LifecycleStarter.execute (LifecycleStarter.java:128)
    at org.apache.maven.DefaultMaven.doExecute (DefaultMaven.java:305)
    at org.apache.maven.DefaultMaven.doExecute (DefaultMaven.java:192)
    at org.apache.maven.DefaultMaven.execute (DefaultMaven.java:105)
    at org.apache.maven.cli.MavenCli.execute (MavenCli.java:957)
    at org.apache.maven.cli.MavenCli.doMain (MavenCli.java:289)
    at org.apache.maven.cli.MavenCli.main (MavenCli.java:193)
    at jdk.internal.reflect.DirectMethodHandleAccessor.invoke (DirectMethodHandleAccessor.java:103)
    at java.lang.reflect.Method.invoke (Method.java:580)
    at org.codehaus.plexus.classworlds.launcher.Launcher.launchEnhanced (Launcher.java:282)
    at org.codehaus.plexus.classworlds.launcher.Launcher.launch (Launcher.java:225)
    at org.codehaus.plexus.classworlds.launcher.Launcher.mainWithExitCode (Launcher.java:406)
    at org.codehaus.plexus.classworlds.launcher.Launcher.main (Launcher.java:347)
Caused by: org.apache.maven.plugin.compiler.CompilationFailureException: Compilation failure
    at org.apache.maven.plugin.compiler.AbstractCompilerMojo.execute (AbstractCompilerMojo.java:858)
    at org.apache.maven.plugin.compiler.CompilerMojo.execute (CompilerMojo.java:129)
    at org.apache.maven.plugin.DefaultBuildPluginManager.executeMojo (DefaultBuildPluginManager.java:137)
    at org.apache.maven.lifecycle.internal.MojoExecutor.execute (MojoExecutor.java:210)
    at org.apache.maven.lifecycle.internal.MojoExecutor.execute (MojoExecutor.java:156)
    at org.apache.maven.lifecycle.internal.MojoExecutor.execute (MojoExecutor.java:148)
    at org.apache.maven.lifecycle.internal.LifecycleModuleBuilder.buildProject (LifecycleModuleBuilder.java:117)
    at org.apache.maven.lifecycle.internal.LifecycleModuleBuilder.buildProject (LifecycleModuleBuilder.java:81)
    at org.apache.maven.lifecycle.internal.builder.singlethreaded.SingleThreadedBuilder.build (SingleThreadedBuilder.java:56)
    at org.apache.maven.lifecycle.internal.LifecycleStarter.execute (LifecycleStarter.java:128)
    at org.apache.maven.DefaultMaven.doExecute (DefaultMaven.java:305)
    at org.apache.maven.DefaultMaven.doExecute (DefaultMaven.java:192)
    at org.apache.maven.DefaultMaven.execute (DefaultMaven.java:105)
    at org.apache.maven.cli.MavenCli.execute (MavenCli.java:957)
    at org.apache.maven.cli.MavenCli.doMain (MavenCli.java:289)
    at org.apache.maven.cli.MavenCli.main (MavenCli.java:193)
    at jdk.internal.reflect.DirectMethodHandleAccessor.invoke (DirectMethodHandleAccessor.java:103)
    at java.lang.reflect.Method.invoke (Method.java:580)
    at org.codehaus.plexus.classworlds.launcher.Launcher.launchEnhanced (Launcher.java:282)
    at org.codehaus.plexus.classworlds.launcher.Launcher.launch (Launcher.java:225)
    at org.codehaus.plexus.classworlds.launcher.Launcher.mainWithExitCode (Launcher.java:406)
    at org.codehaus.plexus.classworlds.launcher.Launcher.main (Launcher.java:347)
[ERROR]
[ERROR]
[ERROR] For more information about the errors and possible solutions, please read the following articles:
[ERROR] [Help 1] http://cwiki.apache.org/confluence/display/MAVEN/MojoFailureException
Asking ChatGPT does not give me the right answer either:
image.png
So finally after some googling:
The explanation of the “source” and “target” compatibility version is explained here:
And the proper way to configure the pom.xml is explained here:
And so for our pom.xml, the following changes are needed – insert the following into pom.xml:
  <properties>
    <maven.compiler.source>1.8</maven.compiler.source>
    <maven.compiler.target>1.8</maven.compiler.target>
  </properties>


Resulting in the following pom.xml:
Selection_1034
After compilation using “mvn compile -X -e”:
[DEBUG]   (f) compilerId = javac
[DEBUG]   (f) debug = true
[DEBUG]   (f) failOnError = true
[DEBUG]   (f) forceJavacCompilerUse = false
[DEBUG]   (f) fork = false
[DEBUG]   (f) generatedSourcesDirectory = /home/tthtlc/telegram-bot-java-tutorial/target/generated-sources/annotations
[DEBUG]   (f) mojoExecution = org.apache.maven.plugins:maven-compiler-plugin:3.1:compile {execution: default-compile}
[DEBUG]   (f) optimize = false
[DEBUG]   (f) outputDirectory = /home/tthtlc/telegram-bot-java-tutorial/target/classes
[DEBUG]   (f) projectArtifact = zaurkhb.com:zauredu_bot:jar:1.0-SNAPSHOT
[DEBUG]   (f) showDeprecation = false
[DEBUG]   (f) showWarnings = false
[DEBUG]   (f) skipMultiThreadWarning = false
[DEBUG]   (f) source = 1.8
[DEBUG]   (f) staleMillis = 0
[DEBUG]   (f) target = 1.8
[DEBUG]   (f) useIncrementalCompilation = true
[DEBUG]   (f) verbose = false
[DEBUG]   (f) mavenSession = org.apache.maven.execution.MavenSession@42435b98
[DEBUG]   (f) session = org.apache.maven.execution.MavenSession@42435b98
[DEBUG] -- end configuration --
....

....

[INFO] Nothing to compile - all classes are up to date

[INFO] ------------------------------------------------------------------------
[INFO] BUILD SUCCESS
[INFO] ------------------------------------------------------------------------
[INFO] Total time:  0.439 s

So successful compilation finally.

ModuleNotFoundError: No module named ‘binwalk.core’

Do you get the following error in binwalk:

That is because the binwalk 2.1.0 from "pip install binwalk".

The solution is to download binwalk 2.3.4 from https://github.com/ReFirmLabs/binwalk/releases and build the binwalk via:

"python setup.py build" and "python setup.py install".

Pentesting API techniques

https://attacker-codeninja.github.io/2021-08-28-Hacking-APIs-notes-from-bug-bounty-bootcamp/
https://microsoft.github.io/code-with-engineering-playbook/continuous-integration/dev-sec-ops/penetration-testing/penetration_testing/
https://mlhale.github.io/nebraska-gencyber-modules/penetration_testing/README/
https://dsopas.github.io/MindAPI/references/
https://bitvijays.github.io/LFF-IPS-P1-IntelligenceGathering.html
https://victomteng1997.github.io/2020/09/06/research-pentesting/
https://sjcaldwell.github.io/2020/04/28/deep-rl-infosec.html
https://jsom1.github.io/_summaries/metasploit
https://patricegodefroid.github.io/public_psfiles/icse2019.pdf
https://jhalon.github.io/becoming-a-pentester/
https://rapid7.github.io/metasploit-framework/docs/development/google-summer-of-code/gsoc-2021-project-ideas.html
https://kymb0.github.io/how2_b_a_pentester_part2/
https://benwick921.github.io/
https://patricegodefroid.github.io/public_psfiles/icst2020.pdf
https://microsoft.github.io/code-with-engineering-playbook/automated-testing/shadow-testing/
https://0x00-0x00.github.io/research/2018/10/17/Windows-API-and-Impersonation-Part1.html
https://bitvijays.github.io/LFF-IPS-P2-VulnerabilityAnalysis.html
https://s3cur3th1ssh1t.github.io/SharpImpersonation-Introduction/
https://0x00-0x00.github.io/research/2018/10/21/Windows-API-And-Impersonation-Part-2.html
https://nutcrackerssecurity.github.io/blog.html
https://wunderwuzzi23.github.io/blog/posts/2020/chrome-spy-remote-control/
https://cocomelonc.github.io/categories/
https://p4p1.github.io/portfolio/index.html
https://center-for-threat-informed-defense.github.io/security-stack-mappings/AWS/README.html
https://chousensha.github.io/blog/2016/08/29/pentest-tools-recon-ng/
https://itm4n.github.io/windows-dll-hijacking-clarified/
https://wqreytuk.github.io/Patrick%2BEngebretson%2BThe%2BBasics%2Bof%2BHacking%2Band%2BPenetration%2BTesting,%2BSecond%2BEdition%2B%25282013%2529.pdf
https://jaimevalero.github.io/managing-awesome-lists/var/awl-trimstray%2540the-book-of-secret-knowledge.html
https://w3c.github.io/wot-security/
https://wifipineapple.github.io/wifipineapple-wiki/%23!index.md
https://spreadsecurity.github.io/2016/08/01/open-source-web-reconnaissance-with-recon-ng.html

https://itm4n.github.io/lsass-runasppl/
https://damonmohammadbagher.github.io/Posts/05may2021x.html
https://weihang-wang.github.io/papers/ambiguous-ase21nier.pdf
https://s3cur3th1ssh1t.github.io/Playing-with-OffensiveNim/
https://drewadwade.github.io/training/training.html
https://sap.github.io/risk-explorer-for-software-supply-chains/
https://uclisec.github.io/fileadmin/sec/publications/weir-interventions-2019.pdf
https://swisskyrepo.github.io/PayloadsAllTheThingsWeb/
https://gosecure.github.io/presentations/2021-02-unicode-owasp-toronto/philippe_arteau_owasp_unicode_v4.pdf
https://b4ny4n.github.io/network-pentest/2020/06/17/kapacitor-shells-via-chronograph.html
https://rapid7.github.io/metasploit-framework/docs/development/maintainers/process/guidelines-for-accepting-modules-and-enhancements.html
https://ruuucker.github.io/cheatsheets/madb/
https://klezvirus.github.io/RedTeaming/AV_Evasion/CodeExeNewDotNet/
https://byt3bl33d3r.github.io/automating-the-empire-with-the-death-star-getting-domain-admin-with-a-push-of-a-button.html
https://pequalsnp-team.github.io/cheatsheet/flask-jinja2-ssti
https://bitvijays.github.io/LFF-IPS-P4-PostExploitation.html
https://wcventure.github.io/FuzzingPaper/
https://m0chan.github.io/2019/12/17/Bug-Bounty-Cheetsheet.html
https://bitvijays.github.io/LFF-IPS-P3-Exploitation.html
https://viralmaniar.github.io/osint/reconnaissance/BigBountyRecon/
https://itm4n.github.io/printspoofer-abusing-impersonate-privileges/
https://patricegodefroid.github.io/public_psfiles/Fuzzing-101-CACM2020.pdf
https://damonmohammadbagher.github.io/Posts/29mar2021x.html
https://damonmohammadbagher.github.io/Posts/24_1mar2021x.html
https://victomteng1997.github.io/
https://awesomerank.github.io/lists/sbilly/awesome-security.html
https://malenezi.github.io/malenezi/pdfs/18190-39246-1-PB.pdf
https://itm4n.github.io/dll-proxying/
https://commoncriteria.github.io/pp/mobile-device/mobile-device-release.html
https://awesomerank.github.io/lists/qazbnm456/awesome-web-security.html
https://cocomelonc.github.io/tutorial/2021/12/06/malware-injection-9.html
https://microsoft.github.io/code-with-engineering-playbook/security/rules-of-engagement/
https://dkasak.github.io/
https://swisskyrepo.github.io/PayloadsAllTheThingsWeb/API%2520Key%2520Leaks/
https://arvandy.github.io/2021-04-01-OSEP/
https://dazzyddos.github.io/posts/AMSI-Bypass/
https://dazzyddos.github.io/posts/Offensive-Lateral-Movement/
https://b0rn2r00t.github.io/
https://owasp.github.io/german-owasp-day/archive/2018/slides/2018-god-holguera.pdf
https://damonmohammadbagher.github.io/
https://tox7cv3nom.github.io/2020/10/28/web-cahe-posioning-to-xss-and-ssrf.html
https://chousensha.github.io/blog/2014/06/03/pentest-lab-metasploitable-2/
https://itm4n.github.io/windows-server-netman-dll-hijacking/
https://mrbaselier.github.io/NLInfoSec-Repo/reverse_engineering/tools
https://menketechnologies.github.io/about.html
https://f3real.github.io/iat_hooking.html
https://itm4n.github.io/vba-runpe-part2/
https://itm4n.github.io/vba-runpe-part1/
https://ailab-ua.github.io/courses/resources/the_malicious_use_of_artificial_intelligence_-_forecaseting_prevention_and_mitigation.pdf
https://microsoft.github.io/code-with-engineering-playbook/code-reviews/recipes/javascript-and-typescript/
https://wcventure.github.io/FuzzingPaper/Paper/2017_review.pdf
https://charlieinden.github.io/ios-interviews/2019-09-09_iOS-App-Security-65af1d0f3e09.html
https://itm4n.github.io/cdpsvc-dll-hijacking/
https://wunderwuzzi23.github.io/blog/posts/2020/cookie-crimes-on-mirosoft-edge/
https://grosquildu.github.io/pentests/mobile/
https://uptane.github.io/papers/Penetration_Test_Report.pdf
https://jcarpizo.github.io/owasp-info/cheatsheets/Abuse_Case_Cheat_Sheet.html
https://oaklandsok.github.io/papers/muller2017.pdf
https://chousensha.github.io/blog/2016/08/24/book-review-nmap-network-scanning/
https://ceso.github.io/posts/2020/12/hacking-resources/
https://mavericknerd.github.io/knowledgebase/BugBountyRecon/
https://mrw0r57.github.io/2020-06-01-windows-exploitation-11-1/
https://netsec-focus.github.io/oscp/2021/05/06/The_Journey_to_Try_Harder-_TJnull-s_Preparation_Guide_for_PEN-200_PWK_OSCP_2.0.html
https://rayenmessaoudi.github.io/about/
https://owasp.github.io/CheatSheetSeries/cheatsheets/Third_Party_Javascript_Management_Cheat_Sheet.html
https://jpminty.github.io/cheatsheet/DFIR/
https://alrawi.github.io/static/papers/supply-chain-NDSS21.pdf
https://its-a-feature.github.io/
https://averagesecurityguy.github.io/assets/hack-yourself-first-final.pdf
https://impillar.github.io/files/icse2020ausera.pdf
https://benjitrapp.github.io/memories/2022-08-28-ultimate-cheatsheet/
https://gexos.github.io/Hacking-Tools-Repository/
https://itm4n.github.io/bypassing-lsa-protection-userland/
https://trickster0.github.io/posts/Halo’s-Gate-Evolves-to-Tartarus-Gate/
https://r00tb3.github.io/security/2018/01/20/Security-Resources-Part-1.html
https://0xd4y.github.io/
https://attl4s.github.io/assets/pdf/Understanding_Active_Directory_Enumeration.pdf
https://x-c3ll.github.io/
http://simonnfoley.github.io/pubs/nspw2017.pdf
https://sophron.github.io/lowcost-freelancing-pentest/6/report.pdf
https://mccright.github.io/references/
https://phonexicum.github.io/infosec/tools.html
https://dazzyddos.github.io/
https://eapolsniper.github.io/
https://p1ay8y3ar.github.io/cve_monitor/
https://jtalway.github.io/resources.html
https://tingsu.github.io/files/fse18-ausera-industry.pdf
https://bashirmohd.github.io/projects.html
https://jhalon.github.io/pentestit-lab-11-crm-token/
https://itm4n.github.io/credential-guard-bypass/
https://theevilbit.github.io/posts/gatekeeper_not_a_bypass/
https://pinzger.github.io/papers/Breiling2021-cryptoinfra.pdf
https://alexfrancow.github.io/app-development/OffensiVe-Security-with-V-Shellcode-Execution/
https://prateek147.github.io/security/
https://wilsonmar.github.io/security-certs/
https://swisskyrepo.github.io/PayloadsAllTheThingsWeb/CSRF%2520Injection/
https://angelosk.github.io/Papers/theses/bowen_thesis.pdf
https://doomzhou.github.io/2014/08/05/hacker-media.html
https://cobalt-strike.github.io/community_kit/
https://vinniefalco.github.io/BeastAssets/Beast%2520-%2520Hybrid%2520Application%2520Assessment%25202017%2520-%2520Assessment%2520Report%2520-%252020171114.pdf
https://r3ap3er.github.io/
https://jhalon.github.io/OSCE-Review/
https://cipher387.github.io/osint_stuff_tool_collection/
https://abrandao.github.io/
https://ruffsl.github.io/IROS2018_SROS2_Tutorial/
https://wishlog.github.io/pentest-notes/
https://microsoft.github.io/code-with-engineering-playbook/continuous-integration/dev-sec-ops/secret-management/recipes/detect-secrets-ado/
https://khasmek.github.io/you-seen-this/%23!recon.md
https://weihang-wang.github.io/papers/ICSE2022_ambitr.pdf
https://cocomelonc.github.io/pentest/2021/09/29/findmyprocess.html
https://acmccs.github.io/papers/p1757-pellegrinoA.pdf
https://tanu1208.github.io/media/summaries/IN5290%2520-%2520Ethical%2520Hacking.pdf
https://stfbk.github.io/news/
https://nccgroup.github.io/pip3line/index.html
https://giorgioditizio.github.io/publication/mitweb/mitweb.pdf
https://wilsonmar.github.io/posts/
https://itm4n.github.io/the-end-of-ppldump/
https://p0shkatz.github.io/blog/2019/01/system.io.file-part1/
https://necromuralist.github.io/index-9.html
https://sirionrazzer.github.io/blog/tags/android/
https://mahmoods01.github.io/files/ndss18-dom-xss.pdf
https://faisalfs10x.github.io/notes/htbctf
https://hot3eed.github.io/2021/01/28/imessage.html
https://acartamersoy.github.io/static/media/roundy_sp20.f26291b3.pdf
https://fardeen-ahmed.github.io/
https://mansstiv.github.io/
https://dominicusin.github.io/2020/05/21/poc-in-github.html
https://vixentael.github.io/posts/secure-development-is-dead/
https://rollingstarky.github.io/tags/
https://jmortega.github.io/
https://spenkk.github.io/assets/documents/meetups/from_ssl_pinning_bypass_to_xxe_injection.pdf
https://alt3kx.github.io/
http://capstone-engine.github.io/showcase.html
https://leo00000.github.io/pdf/us-15-Li-Attacking-Interoperability-An-OLE-Edition.pdf
https://singhvbv.github.io/
https://swisskyrepo.github.io/PayloadsAllTheThingsWeb/SQL%2520Injection/BigQuery%2520Injection/
https://sirionrazzer.github.io/blog/tags/iOS/
https://rajatrao-13.github.io/learning/2020/06/10/Mobile-Security/
https://c4pr1c3.github.io/awesome-ctf/
https://whmacmac.github.io/RedTeam_Exercises_with_OpenSource_Tools_Part_1
https://cocomelonc.github.io/tutorial/2021/09/18/malware-injection-1.html
https://kowalcj0.github.io/2018/03/20/ethical-hackin-buffer-iverflow/
https://sirionrazzer.github.io/blog/tags/security/
https://cocomelonc.github.io/malware/2022/08/16/malware-av-evasion-9.html
https://sirionrazzer.github.io/blog/
https://martinkubecka.github.io/posts/general/malicious-macros/
https://chousensha.github.io/blog/2014/09/17/kali-tools-catalog-vulnerability-analysis/
https://itm4n.github.io/cve-2020-0787-windows-bits-eop/
https://jsom1.github.io/_walkthroughs/Seal
https://absoluteappsec.github.io/
https://resv.github.io/
https://swisskyrepo.github.io/PayloadsAllTheThingsWeb/Methodology%2520and%2520Resources/Active%2520Directory%2520Attack/
https://iranthreats.github.io/us-16-Guarnieri-Anderson-Iran-And-The-Soft-War-For-Internet-Dominance-presentation.pdf
https://joaovarelas.github.io/
https://phonexicum.github.io/infosec/osint.html
https://phonexicum.github.io/infosec/windows.html
https://ctmb.github.io/conference-ad-site/speakers.html
https://josephcamarena.github.io/post/advanced-web-security/
https://m0chan.github.io/2019/07/30/Windows-Notes-and-Cheatsheet.html
https://chousensha.github.io/blog/2014/09/24/kali-tools-catalog-web-applications/
https://sidchn.github.io/posts/htb-apt/
https://7h3ram.github.io/pages/cv.html
https://itm4n.github.io/windows-registry-rpceptmapper-exploit/
https://snwajax.github.io/
https://averagesecurityguy.github.io/page3
https://pablito2020.github.io/htb-writeup-oz/
https://fahmifj.github.io/ctf/
https://bsturk.github.io/resume.html
https://misakikata.github.io/2019/10/Windows-Notes/
https://git-akihakune.github.io/blog/backdoor/
https://cocomelonc.github.io/tutorial/2021/09/15/simple-rev-c-1.html
https://metrodango.github.io/pip3line/index.html
https://queencitycyber.github.io/network_scanning/
https://fahmifj.github.io/hackthebox/
https://airbus-seclab.github.io/ilo/SSTIC2018-Article-subverting_your_server_through_its_bmc_the_hpe_ilo4_case-gazet_perigaud_czarny.pdf
http://bitvijays.github.io/_sources/LFF-IPS-P1-IntelligenceGathering.txt
https://seanpesce.github.io/Portfolio/assets/doc/Resume_SeanPesce.pdf
https://trolologuy.github.io/useful-tools/
https://viralvaghela.github.io/
https://axcheron.github.io/writeups/htb/multimaster/
https://danielklim.github.io/r00tz2018/
https://freezerodays.github.io/posts/Offensive-Weekly-Roundup-April-2022/
https://airbus-seclab.github.io/ilo/RECONBRX2018-Slides-Subverting_your_server_through_its_BMC_the_HPE_iLO4_case-perigaud-gazet-czarny.pdf
https://sp00ks-git.github.io/posts/WordPress-WPForce/
https://wovo.github.io/ctl/
https://jaimevalero.github.io/managing-awesome-lists/var/topics/reverse-engineering.html
https://big5-sec.github.io/SourceFu/documentation/introduction.html
https://rapid7.github.io/metasploit-framework/docs/using-metasploit/intermediate/pivoting-in-metasploit.html
https://ceso.github.io/posts/2020/04/hacking-cheatsheet/
https://mzet-.github.io/2019/05/10/les-paper.html
https://cloufish.github.io/blog/posts/Security-Of-Docker-Containers/
https://cyberkhalid.github.io/posts/ad-fcp-user/
https://torsec.github.io/shield-h2020/documents/project-deliverables/SHIELD_D6.4_Final_Report_on_Exploitation_Activities_v.1.0.pdf
https://niebardzo.github.io/2021-08-23-root-principal-in-aws/
http://prateek147.github.io/
https://thibaudrobin.github.io/writeups/santhacklaus-2019/survivall/
https://misp.github.io/MISP/Changelog/
http://jnyryan.github.io/toolbox/
https://fraunhofer-aisec.github.io/gallia/uds/scan_modes.html
https://qazbnm456.github.io/Resume-SYUE-SIANG-SU.pdf
https://craigopie.github.io/resume.pdf
https://awesomerank.github.io/lists/rshipp/awesome-malware-analysis.html
https://phonexicum.github.io/infosec/reverse.html
https://ox0xo.github.io/ctf/KringleCon2
https://38elements.github.io/2017/01/11/php-repository-github-star-ranking.html
https://aidenpearce369.github.io/offsec/AMSI-Memory-Bypass/
https://jesusi4z.github.io/
https://mypluribus.github.io/
https://danieljpinto.github.io/
https://cutting-edge-visionaries.github.io/Resources/
https://leanprover-community.github.io/archive/stream/113488-general/topic/Lean.20in.20the.20wild.html
https://eddenk.github.io/
https://thr3athunt3r.github.io/ctf-1
https://xuanwulab.github.io/cn/secnews/2017/02/04/index.html
https://bitvijays.github.io/_sources/LFF-IPS-P4-PostExploitation.txt
https://xuanwulab.github.io/cn/secnews/2016/01/15/index.html
https://kumarnitinsingh.github.io/Nitin/
https://ics-portfolios.github.io/all/
https://ics-portfolios.github.io/alumni/
https://bodik.github.io/ccao-rss/
https://pentesploit.github.io/tags/
http://lee101.github.io/
https://0xhop.github.io/
https://davnils.github.io/
https://henryfbp.github.io/posts/2020-06-15-csslp-notes/
https://ondrik8.github.io/byPass_AV/
https://asross.github.io/publications/RolnickEtAl2019.pdf
https://codeh4ck3r.github.io/
https://kirkins.github.io/Cyber-Crime-Micro-Course/links.html
https://gedare.github.io/vitae-gedare.pdf
https://damonmohammadbagher.github.io/Posts/12aug2021x.html
https://zweilosec.github.io/posts/laser/
https://j-info.github.io/ctfsite/
https://kyllianlissens.github.io/
https://stevenjackson.github.io/tiddly/tiddly.html
https://ivankatliarchuk.github.io/
https://sh1n0bi.github.io/blog
https://sfwltd.github.io/techradar/2017/02/02/continuous-improvement-to-continuous-delivery.html
https://strontic.github.io/xcyclopedia/library/explorer.exe-F45B61D1DE3A6DD90F1E2ECD21DC83CB.html
https://strontic.github.io/xcyclopedia/library/explorer.exe-021A4A566AE86079929A482DCE9B76A7.html
https://baadmaro.github.io/posts/IoT-Pentesting-with-Teltonika-RUT9XX/
https://yunwan1x.github.io/awesome-cn/awesome/awesome-security/
https://jsecu.github.io/2020/07/03/juiceshop/
https://tyeyeah.github.io/2021/08/02/2021-08-02-Bypass-Anti-Virus/
https://nihti.github.io/pentest/h3.html
https://0xsh1v4.github.io/posts/2020/09/tryhackme-wonderland-writeup/
https://lolkatz.github.io/will-hack-for-coffee/2022/05/28/northsec-hackademy.html
https://m3n0sd0n4ld.github.io/
https://eivindarvesen.github.io/intro-ctf-startpage/hints.pdf

Wirteup on AFL fuzzing techniques

https://wcventure.github.io/pdf/ICSE2020_MemLock.pdf
https://wcventure.github.io/FuzzingPaper/Paper/ICST19_MemFuzz.pdf
https://crossbowerbt.github.io/in_memory_fuzzing.html
https://andreafioraldi.github.io/assets/qasan-secdev20.pdf
https://wcventure.github.io/FuzzingPaper/Paper/ASE17_Similarity.pdf
https://gamozolabs.github.io/fuzzing/2020/12/06/fuzzos.html
https://doar-e.github.io/blog/2021/07/15/building-a-new-snapshot-fuzzer-fuzzing-ida/
https://h0mbre.github.io/Fuzzing-Like-A-Caveman-4/
https://wcventure.github.io/FuzzingPaper/Paper/NDSS18_IoTfuzzer.pdf
https://wcventure.github.io/FuzzingPaper/Paper/NDSS18_IoTFuzzer_Slides.pdf
https://wcventure.github.io/pdf/ICSE2020_MemLock_Slides.pdf
https://h0mbre.github.io/Fuzzing-Like-A-Caveman-6/
https://microsoftedge.github.io/edgevr/posts/a-story-of-a-bug-found-fuzzing/
https://wcventure.github.io/FuzzingPaper/
https://andreafioraldi.github.io/assets/qasan-secdev20-slides.pdf
https://alastairreid.github.io/RelatedWork/papers/manes:ieeetse:2019/
https://wcventure.github.io/EnPage/opensource/
https://s2-lab.github.io/assets/20ATC.pdf
https://wcventure.github.io/FuzzingPaper/Paper/SP17_Skyfire.pdf
https://google.github.io/clusterfuzz/reference/glossary/
https://wcventure.github.io/MemLock/
https://agroce.github.io/issre21.pdf
https://google.github.io/oss-fuzz/reference/glossary/
https://wcventure.github.io/FuzzingPaper/Paper/SP20_RetroWrite.pdf
https://google.github.io/clusterfuzzlite/overview/
https://fengweiz.github.io/18fa-csc6991/slides/IoTFuzzer-sezana.pdf
https://theultramarine19.github.io/data/736.pdf
https://lifeasageek.github.io/papers/gwangmu-cafl.pdf
https://wcventure.github.io/FuzzingPaper/Paper/FEAST19_Exploring.pdf
https://tetzank.github.io/posts/coverage-based-fuzzing/
https://wcventure.github.io/FuzzingPaper/Paper/SP18_ColLAFL.pdf
https://gamozolabs.github.io/2020/10/23/some_thoughts_on_gpu_fuzzing.html
https://lifeasageek.github.io/papers/jaewon-difuzzrtl.pdf
https://google.github.io/oss-fuzz/advanced-topics/ideal-integration/
https://google.github.io/clusterfuzz/setting-up-fuzzing/blackbox-fuzzing/
https://bytecodealliance.github.io/wasmtime/contributing-fuzzing.html
https://google.github.io/oss-fuzz/advanced-topics/reproducing/
https://saelo.github.io/papers/thesis.pdf
https://wcventure.github.io/FuzzingPaper/Paper/Arxiv19_Machine.pdf
https://researchreview.github.io/RelatedWork/Paper/NDSS16_Driller.pdf
https://chijinz.github.io/archive/minerva_fse22_pre.pdf
https://kou.github.io/arrow-site/docs/developers/cpp/fuzzing.html
https://mboehme.github.io/paper/USENIX22.pdf
https://wcventure.github.io/FuzzingPaper/Paper/SP20_KRace.pdf
https://wcventure.github.io/ChsPage/opensource/2020-01-08-MemLock
https://wcventure.github.io/FuzzingPaper/Paper/NDSS18_Muench_Slides.pdf
https://terrytangyuan.github.io/2022/02/28/argo-security-automation-with-oss-fuzz/
https://wcventure.github.io/EnPage/opensource/2020-01-08-MemLock
https://wcventure.github.io/FuzzingPaper/Paper/AISC19_ConFuzz.pdf
https://wcventure.github.io/FuzzingPaper/Paper/Arxiv20_SoK.pdf
https://wcventure.github.io/FuzzingPaper/Paper/ASIACCS19_PTRIX.pdf
https://google.github.io/clusterfuzzlite/
https://wcventure.github.io/FuzzingPaper/Paper/USENIX20_FuzzGuard.pdf
https://wcventure.github.io/FuzzingPaper/Paper/TRel18_Fuzzing.pdf
https://wcventure.github.io/FuzzingPaper/Paper/RAID19_Coverage.pdf
https://insuyun.github.io/pubs/2020/park:die.pdf
https://wcventure.github.io/FuzzingPaper/Paper/SANER20_Sequence.pdf
https://patricegodefroid.github.io/public_psfiles/hyperfuzzer-ccs21.pdf
https://google.github.io/oss-fuzz/getting-started/continuous-integration/
https://google.github.io/clusterfuzz/using-clusterfuzz/workflows/analyzing-fuzzing-performance/
https://chao-peng.github.io/publication/gpgpu/
https://cmu-program-analysis.github.io/2022/lecture-slides/20-fuzzing.pdf
https://alastairreid.github.io/RelatedWork/notes/fuzz-testing/
https://mboehme.github.io/paper/FSE20.Entropy.pdf
https://impillar.github.io/files/issre2021vallnut.pdf
https://wcventure.github.io/FuzzingPaper/Paper/NDSS20_HotFuzz.pdf
https://wcventure.github.io/FuzzingPaper/Paper/ICPC19_Sequence.pdf
https://machiry.github.io/files/absfuzz.pdf
https://wcventure.github.io/FuzzingPaper/Paper/SP19_NEUZZ.pdf
https://squareslab.github.io/materials/DingOSSFuzz21.pdf
https://yuleisui.github.io/publications/icse20.pdf
https://neu-se.github.io/CS7580-Fall-2021/lecture-notes/11-aflpp/
https://jzuming.github.io/paper/sec20-jiang.pdf
https://wcventure.github.io/FuzzingPaper/Paper/OOPSLA19_FuzzFactory.pdf
https://wcventure.github.io/FuzzingPaper/Paper/NDSS16_Driller.pdf
https://fuzzingworkshop.github.io/program.html
https://zzm7000.github.io/teaching/2021springcse703/papers/sec19-zheng_0.pdf
https://wcventure.github.io/FuzzingPaper/Paper/SRDS19_MachFuzzer.pdf
https://gururaj-s.github.io/assets/pdf/CCS21_Ding.pdf
https://google.github.io/oss-fuzz/getting-started/new-project-guide/
https://fengweiz.github.io/18fa-csc6991/slides/IoTFuzzer-Mahbubur.pdf
https://zhyfeng.github.io/files/2022-icse.pdf
https://wcventure.github.io/FuzzingPaper/Paper/USENIX20_ParmeSan.pdf
https://gamozolabs.github.io/fuzzing/2018/11/19/vectorized_emulation_mmu.html
https://google.github.io/oss-fuzz/further-reading/clusterfuzz/
https://patricegodefroid.github.io/public_psfiles/Fuzzing-101-CACM2020.pdf
https://wcventure.github.io/FuzzingPaper/Paper/2017_review.pdf
https://wcventure.github.io/FuzzingPaper/Paper/Cybersecurity18_Fuzzing.pdf
https://cosmoss-jigu.github.io/pages/pubs/fuzzing-xu-ccs17.pdf
https://andreafioraldi.github.io/articles/2019/12/20/sanitized-emulation-with-qasan.html
https://google.github.io/honggfuzz/
https://wcventure.github.io/FuzzingPaper/Paper/SP19_Full-speed.pdf
https://gaintcome.github.io/files/meuzz.pdf
https://asset-group.github.io/publications.html
https://ssvlab.github.io/lucasccordeiro/papers/fase2022.pdf
https://thuanpv.github.io/publications/TSE19_aflsmart.pdf
https://mboehme.github.io/paper/FSE20.EmpiricalLaw.pdf
https://ajax4sec.github.io/papers/ASE_2021.pdf
https://wcventure.github.io/FuzzingPaper/Paper/NDSS19_REDQUEEN.pdf
https://nstarke.github.io/qemu/u-boot/bootloader/fuzzing/negative-result/2021/03/12/u-boot-fuzzing.html
https://wcventure.github.io/FuzzingPaper/Paper/SOSP19_Hydra.pdf
https://wcventure.github.io/FuzzingPaper/Paper/Arxiv19_VFuzz.pdf
https://multics69.github.io/pages/pubs/fuzzing-xu-ccs17-slides.pdf
https://wcventure.github.io/FuzzingPaper/Paper/USENIX20_EcoFuzz.pdf
https://mxz297.github.io/files/TDSC20.pdf
https://barro.github.io/
https://binsec.github.io/nutshells/raid-20.html
https://wcventure.github.io/FuzzingPaper/Paper/ICST19_SeqFuzzer.pdf
https://wsp-lab.github.io/papers/lee-montage-sec20.pdf
https://neu-se.github.io/CS7580-Fall-2021/lecture-notes/10-aflfast/
https://wcventure.github.io/FuzzingPaper/Paper/DAC20_ICSProtocol.pdf
https://edmcman.github.io/papers/tse21.pdf
https://topicsec.github.io/posts/winnie/
https://binsec.github.io/assets/publications/papers/2020-raid.pdf
https://wcventure.github.io/FuzzingPaper/Paper/USENIX20_GREYONE.pdf
https://wcventure.github.io/FuzzingPaper/Paper/NDSS20_HYPER-CUBE.pdf
https://mboehme.github.io/paper/CCS21.pdf
https://squizz617.github.io/slides/hydra-sosp19-slides.pdf
https://wcventure.github.io/FuzzingPaper/Paper/Thesis12_Hybrid.pdf
http://hexhive.github.io/publications
http://jefftrull.github.io/c%2B%2B/clang/llvm/fuzzing/sanitizer/2015/11/27/fuzzing-with-sanitizers.html
https://wcventure.github.io/FuzzingPaper/Paper/USENIX19_FUZZIFICATION.pdf
https://wcventure.github.io/FuzzingPaper/Paper/ACSAC18_TIFF.pdf
https://toastedcornflakes.github.io/articles/fuzzing_capstone_with_afl.html
https://gururaj-s.github.io/packet/research.stmt.gs.pdf
https://lifeasageek.github.io/papers/han-meds.pdf
https://qingkaishi.github.io/public_pdfs/SP22.pdf
https://lifeasageek.github.io/papers/suhwan-r2z2.pdf
https://gamozolabs.github.io/2020/08/11/some_fuzzing_thoughts.html
https://wwkenwong.github.io/fuzzing/2021/02/14/fuzzing-1.html
https://zzm7000.github.io/teaching/2021springcse703/papers/icse09.pdf
https://ssvlab.github.io/lucasccordeiro/supervisions/bsc_thesis_maks.pdf
https://yaohway.github.io/meuzz.pdf
https://asset-group.github.io/papers/BrakTooth.pdf
https://cnsatuva.github.io/files/Fuzzing_for_Vulnerabilities.pdf
https://airbus-seclab.github.io/GUSTAVE_dmu/Gustave_DMU_cyber_week_03_2021.pdf
https://beerkay.github.io/papers/Berkay2021PGFuzzNDSS.pdf
https://wcventure.github.io/FuzzingPaper/Paper/SP19_Fuzzing_File.pdf
https://andreafioraldi.github.io/about.html
https://baijiaju.github.io/
https://haehyun.github.io/papers/favocado-ndss21.pdf
https://youwei1988.github.io/papers/SP2019.pdf
https://googleprojectzero.github.io/0days-in-the-wild/0day-RCAs/2020/CVE-2020-27950.html
https://patricegodefroid.github.io/public_psfiles/talk-HCSS2019.pdf
https://binsec.github.io/assets/publications/papers/2022-fuzzing.pdf
https://baerli.github.io/arm-fuzzingcluster/docs/additional-notes/
https://wcventure.github.io/FuzzingPaper/Paper/FSE19_Cerebro.pdf
https://lifeasageek.github.io/papers/kim-hfl.pdf
https://microsoftedge.github.io/edgevr/
https://squizz617.github.io/pubs/hydra-tos20.pdf
https://qingkaishi.github.io/public_pdfs/SP2020.pdf
https://wcventure.github.io/FuzzingPaper/Paper/ICSE20_Ankou.pdf
https://wcventure.github.io/FuzzingPaper/Paper/PAC17_ExploitMeter.pdf
https://zyingp.github.io/files/MultiFuzz.pdf
https://squareslab.github.io/materials/vanTonderSCB2018.pdf
https://mboehme.github.io/paper/IEEESoftware20.pdf
https://yinxingxue.github.io/papers/usenixsity2020_MUZZ%2520Thread-aware%2520Grey-box%2520Fuzzing%2520for%2520Effective%2520Bug%2520Hunting%2520in%2520Multithreaded%2520Programs.pdf
https://wcventure.github.io/FuzzingPaper/Paper/CCS17_SlowFuzz.pdf
https://wcventure.github.io/FuzzingPaper/Paper/Arxiv20_Protocols.pdf
https://mboehme.github.io/paper/ICSE22.pdf
https://wcventure.github.io/FuzzingPaper/Paper/20_SmartSeedSelection.pdf
https://chenbihuan.github.io/paper/icse19-wang-superion.pdf
https://a13xp0p0v.github.io/2021/02/09/CVE-2021-26708.html
https://gamozolabs.github.io/fuzzing/2018/09/16/scaling_afl.html
https://wcventure.github.io/FuzzingPaper/Paper/USENIX19_Antifuzz.pdf
https://google.github.io/clusterfuzzlite/running-clusterfuzzlite/github-actions/
https://sap.github.io/fosstars-rating-core/oss/security/apache/kafka.html
https://acmccs.github.io/papers/p2329-bohmeAemb.pdf
https://wcventure.github.io/FuzzingPaper/Paper/SP19_Razzer.pdf
https://yaohway.github.io/research.html
https://patricegodefroid.github.io/public_psfiles/ndss2008.pdf
https://huhong789.github.io/papers/jung:winnie.pdf
https://lifeasageek.github.io/papers/suhwan-crfuzz.pdf
https://hexhive.github.io/publications/files/18Oakland-presentation.pdf
https://lifeasageek.github.io/papers/suhwan-r2z2-slides.pdf
https://silm-workshop.github.io/2022-papers/silm2022-bugsbunny.pdf
https://zhendong2050.github.io/res/AsiaCCS21.pdf
https://wcventure.github.io/FuzzingPaper/Paper/USENIX19_Grimoire.pdf
https://cmu-program-analysis.github.io/2021/lecture-slides/17-fuzzing.pdf
https://wcventure.github.io/FuzzingPaper/Paper/CCS18_Revery.pdf
https://thalium.github.io/blog/posts/fuzzing-microsoft-rdp-client-using-virtual-channels/
https://mboehme.github.io/paper/TSE18.pdf
https://thuanpv.github.io/publications/ASE16.pdf
https://ristov.github.io/publications/milcom17-bbuzz.pdf
https://havrikov.github.io/publications/icse2017_havrikov.pdf
https://mudongliang.github.io/files/papers/GREBE.pdf
https://assist-project.github.io/papers/So-Many-Fuzzers%40ASE-22.pdf
https://gamozolabs.github.io/fuzzing/2018/10/14/vectorized_emulation.html
https://lifeasageek.github.io/papers/kim-hfl-slides.pdf
https://sanette.github.io/ocaml-tutorial/4.06/spacetime.html
https://sap.github.io/fosstars-rating-core/oss/security/apache/lucene-solr.html
https://wcventure.github.io/FuzzingPaper/Paper/ICSE19_Superion.pdf
https://alexplaskett.github.io/coverage-guided-fuzzing-golang/
https://insuyun.github.io/pubs/2020/yun:archeap.pdf
https://lifeasageek.github.io/papers/cheolwoo-mundofuzz.pdf
https://gamozolabs.github.io/
https://sanette.github.io/ocaml-tutorial/4.07/afl-fuzz.html
https://lifeasageek.github.io/class/cs52700-fall16/pages/prog-assignment-1.html
https://libvips.github.io/libvips/2019/08/18/libvips-in-oss-fuzz.html
https://libvips.github.io/libvips/2019/08/18/libvips-in-oss-fuzz.html
https://wcventure.github.io/FuzzingPaper/Paper/ASIACCS19_Feature-Oriented.pdf
https://machiry.github.io/files/diane.pdf
https://symeonp.github.io/2017/09/17/fuzzing-winafl.html
https://wcventure.github.io/FuzzingPaper/Paper/CCS16_SystematicFuzzing.pdf
https://machiry.github.io/files/teezz.pdf
https://wcventure.github.io/FuzzingPaper/Paper/USENIX19_MOPT.pdf
https://wcventure.github.io/FuzzingPaper/Paper/ACSAC18_AFLCon.pdf
https://rodykersten.github.io/publications/ccs17-kersten.pdf
https://sap.github.io/fosstars-rating-core/oss/security/aws/amazon-freertos.html
https://desword.github.io/paper/ref/Matryoshka%25E5%25A5%2597%25E5%25A8%2583_%25E8%259A%2582%25E8%259A%2581%25E9%2587%2591%25E6%259C%258D_ccs19.pdf
https://kaist-s4.github.io/pubs/2020/park:die-slides.pdf
https://wcventure.github.io/pdf/ICSE2020_UAFL_Slides.pdf
https://google.github.io/clusterfuzzlite/running-clusterfuzzlite/
https://asset-group.github.io/papers/STVR-cache-side-channel-fuzz.pdf
https://wcventure.github.io/FuzzingPaper/Paper/CCS19_Intriguer.pdf
https://wcventure.github.io/FuzzingPaper/Paper/USENIX18_Kafl_Slides.pdf
https://hexhive.github.io/projects/
https://johnwickerson.github.io/
https://gururaj-s.github.io/
https://acmccs.github.io/papers/p2139-youA.pdf
https://thalium.github.io/blog/posts/rdpegfx/
https://wcventure.github.io/ChsPage/cv/
https://wcventure.github.io/FuzzingPaper/Paper/USENIX20_Fans.pdf
https://hgarrereyn.github.io/GraphFuzz/research/GraphFuzz_ICSE_2022.pdf
https://daehee87.github.io/data/p2faas.pdf
https://wcventure.github.io/
https://patricegodefroid.github.io/public_psfiles/talk-issta2010.pdf
https://unibuc-cs.github.io/river/
https://prateeksahu.github.io/ent_sec/file/Intro_Fuzzing_Exploitation.pdf
https://wcventure.github.io/FuzzingPaper/Paper/Access19_LearnAFL.pdf
https://googleprojectzero.github.io/0days-in-the-wild/0day-RCAs/2021/CVE-2021-1905.html
https://sangho2.github.io/papers/yun:qsym.pdf
https://yuanxzhang.github.io/paper/strawfuzzer-oakland22.pdf
https://lifeasageek.github.io/papers/sunwoo-fuzzorigin.pdf
https://wcventure.github.io/FuzzingPaper/Paper/NDSS18_INSTRIM.pdf
https://chenbihuan.github.io/paper/ccs18-chen-hawkeye.pdf
https://wcventure.github.io/FuzzingPaper/Paper/IEEE2011_protocol.pdf
http://bibtex.github.io/ICST-2019-CoppikSS.html
https://a13xp0p0v.github.io/img/Alexander_Popov-Linux_kernel_fuzzing_in_practice.pdf
https://andreafioraldi.github.io/assets/msc-thesis.pdf
https://jzuming.github.io/paper/issre19-jiang.pdf
https://squizz617.github.io/pubs/robofuzz-fse22.pdf
https://mariachris.github.io/Pubs/ICSE-2020.pdf
https://wcventure.github.io/FuzzingPaper/Paper/PLDI19_Parser.pdf
https://thuanpv.github.io/publications/AFLTeam-ASE21-NIER.pdf
https://ssvlab.github.io/lucasccordeiro/papers/fase2021.pdf
https://mboehme.github.io/paper/ICST20.AFLNet.pdf
https://vu-detail.github.io/publication.html
https://wcventure.github.io/FuzzingPaper/Paper/FSE19_JFI.pdf
https://shsirk.github.io/fuzzing/2019/01/01/monitor_crash.html
https://patricegodefroid.github.io/public_psfiles/icse2014.pdf
https://wcventure.github.io/FuzzingPaper/Paper/USENIX18_Kafl.pdf
https://wcventure.github.io/FuzzingPaper/Paper/Arxiv19_Machine2.pdf
https://yannicnoller.github.io/publications/icse2019_nilizadeh_diffuzz.pdf
https://carstein.github.io/2020/05/02/writing-simple-fuzzer-3.html
https://wcventure.github.io/FuzzingPaper/Paper/ICSESS19_Survey.pdf
https://fredfeng.github.io/papers/fse18.pdf
https://wcventure.github.io/FuzzingPaper/Paper/FSE17_Steelix.pdf
https://wcventure.github.io/FuzzingPaper/Paper/SPW18_Deep.pdf
https://wcventure.github.io/FuzzingPaper/Paper/SP18_T-Fuzz.pdf
https://15316-cmu.github.io/2018/labs/lab3-handout.pdf
http://johanengelen.github.io/ldc/2018/01/14/Fuzzing-with-LDC.html
https://topicsec.github.io/posts/agamotto/
https://wcventure.github.io/FuzzingPaper/Paper/NDSS19_Probabilistic.pdf
https://desword.github.io/paper/ref/EnFuzz_%25E6%25B8%2585%25E5%258D%258E_usenix19.pdf
https://barro.github.io/2018/06/afl-fuzz-on-different-file-systems/
https://airbus-seclab.github.io/GUSTAVE_thcon/GUSTAVE_thcon.pdf
https://hongxuchen.github.io/pdf/fot.pdf
https://wcventure.github.io/FuzzingPaper/Paper/Access19_NeuFuzz%2520.pdf
https://xgao-work.github.io/paper/dsn22.pdf
http://bibtex.github.io/tag/in%2520memory.html
https://asset-group.github.io/papers/Greyhound.pdf
https://wcventure.github.io/FuzzingPaper/Paper/AST12_SECFUZZ.pdf
https://bibtex.github.io/SAC-2011-SimKM.html
https://jzuming.github.io/paper/sec23-jiang.pdf
https://mboehme.github.io/paper/CCS16.pdf
https://cs155.github.io/Spring2019/papers/fuzzing.pdf
https://bshastry.github.io/2017/08/04/Exploring-Fuzzer-Crashes.html
https://acmccs.github.io/papers/p2345-hanA.pdf
https://acmccs.github.io/papers/p2123-corinaA.pdf
https://nchong.github.io/papers/pldi15.pdf
https://patricegodefroid.github.io/public_psfiles/issta2010.pdf
https://ray-cp.github.io/archivers/Papter_Note_IOTFUZZER_Discovering_Memory_Corruptions_in_IoT_Through_App-based_Fuzzing
https://marcellomaugeri.github.io/
https://kunalspathak.github.io/tags/
https://rust-fuzz.github.io/book/cargo-fuzz/tutorial.html
https://jorisvandenbossche.github.io/arrow-docs-preview/html-option-3-single-sidebar/python/api/memory.html
https://lidavidm.github.io/arrow-docs-next/python/api/memory.html
https://rohithmukku.github.io/assets/UGP_Report.pdf
https://zchee.github.io/golang-wiki/PerfDashboard/
https://tyeyeah.github.io/2022/03/26/2022-03-26-Binary-Code-Similarity-Detection-Papers/
https://wjones127.github.io/samples/pyarrow-gandiva-docs-v3/python/api/memory.html
https://wjones127.github.io/samples/pyarrow-gandiva-docs-v3/python/api/plasma.html

Writeup on Heap Exploitation techniques

https://guyinatuxedo.github.io/25-heap/index.html
https://insuyun.github.io/pubs/2020/yun:archeap.pdf
https://adamgold.github.io/posts/basic-heap-exploitation-house-of-force/
https://sigpwny.github.io/presentation-content/SP2021/heap1.pdf
https://y3a.github.io/2021/11/27/house-of-pie/
https://guyinatuxedo.github.io/27-edit_free_chunk/heap_consolidation_explanation/index.html
https://sigpwny.github.io/presentation-content/SP2021/heap2.pdf
https://guyinatuxedo.github.io/28-fastbin_attack/0ctf_babyheap/index.html
https://hoganrichardson.github.io/cs6447-docs/week08/2019/07/22/Lecture-8-Heap-Exploitation.html
https://f1r.github.io/2017/10/27/Heap-Exploitation-EXP/
https://wapiflapi.github.io/2015/04/22/single-null-byte-heap-overflow.html
https://guyinatuxedo.github.io/39-house_of_spirit/house_spirit_exp/index.html
https://guyinatuxedo.github.io/30-unlink/unlink_explanation/index.html
https://argp.github.io/2012/01/03/linux-kernel-heap-exploitation/
https://brant-ruan.github.io/images/0day/54473267732EFADF62E7A8E13D2F0F7F.pdf
https://haehyun.github.io/papers/playing-for-keaps-22-sec.pdf
https://guyinatuxedo.github.io/27-edit_free_chunk/double_free_explanation/index.html
https://daehee87.github.io/data/ruma.pdf
https://guyinatuxedo.github.io/31-unsortedbin_attack/0ctf16_zerostorage/index.html
https://phi1010.github.io/2020-11-02-bget-exploitation-2/
https://lkmidas.github.io/posts/20210103-heap-seccomp-rop/
https://tripoloski1337.github.io/research/2019/09/09/tcache_poisoning.html
https://n1ght-w0lf.github.io/binary%2520exploitation/heap-three/
https://c4ebt.github.io/c4ebt.github.io/
https://a13xp0p0v.github.io/2020/11/30/slab-quarantine.html
https://degrigis.github.io/bins/heapster.pdf
https://argp.github.io/research/
https://samsung.github.io/kspp-study/heap-ovfl.html
https://connormcgarr.github.io/browser1/
https://kernemporium.github.io/kernel/intro/
https://zatoichi-engineer.github.io/assets/docs/pincus.pdf
https://axcheron.github.io/trainings/
https://argp.github.io/posts/
https://siriushsh.github.io/assets/pdf/FILE%2520Structures%2520-%2520Another%2520Binary%2520Exploitation%2520Technique%2520-%2520An-Jie%2520Yang.pdf
https://brant-ruan.github.io/images/0day/3170BFC8B2D0808A5D4326BEB355CDDA.pdf
https://kaist-hacking.github.io/publication/yun-hardsheap/
https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html
https://huhong789.github.io/papers/HCSifter.pdf
https://guyinatuxedo.github.io/42-house_of_einherjar/house_einherjar_exp/index.html
https://guyinatuxedo.github.io/24-heap_overflow/protostar_heap0/index.html
https://guyinatuxedo.github.io/26-heap_grooming/explanation_heap_grooming/index.html
https://connormcgarr.github.io/swimming-in-the-kernel-pool-part-1/
https://n1ght-w0lf.github.io/categories/
https://lkmidas.github.io/posts/20210103-tetctf2021-writeups/
https://farazsth98.github.io/
https://zzm7000.github.io/teaching/2021fallcse410510/slides/W14L1.pdf
https://h3xduck.github.io/vulns/2021/08/22/eternalblue-part7.html
https://samiux.github.io/ctf-heap.html
https://y3a.github.io/
https://argp.github.io/public/binding-the-daemon-wp.pdf
https://guyinatuxedo.github.io/29-tcache/dcquals19_babyheap/index.html
https://adamgold.github.io/tags/heap/
https://rbonichon.github.io/asi36/01-chapter02.pdf
https://introspelliam.github.io/others/2017-06-28/bh-win-04-litchfield.ppt
https://n1ght-w0lf.github.io/binary%2520exploitation/heap-zero/
https://insuyun.github.io/pubs/2021/yun:hardsheap.pdf
https://c4ebt.github.io/2021/01/22/House-of-Rust.html
https://guyinatuxedo.github.io/references/index.html
https://guyinatuxedo.github.io/5.1-mitigation_aslr_pie/index.html
https://zzm7000.github.io/teaching/2022fallcse410510/slides/W12L1.pdf
https://kernemporium.github.io/whoami/whoami/
https://kaist-hacking.github.io/author/taesoo-kim/
https://syst3mfailure.github.io/sudo-heap-overflow
https://insuyun.github.io/pubs/2021/wickman:ffmalloc.pdf
https://googleprojectzero.github.io/0days-in-the-wild/0day-RCAs/2020/CVE-2020-15999.html
https://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2022/CVE-2022-2294.html
https://secnate.github.io/resources/exploit-development/
https://n1ght-w0lf.github.io/binary%2520exploitation/heap-two/
https://n1ght-w0lf.github.io/binary%2520exploitation/uaf/
https://empyreal96.github.io/nt-info-depot/page6.html
https://guyinatuxedo.github.io/
https://kaist-hacking.github.io/author/insu-yun/
https://zaratec.github.io/awesome-windows-ctf/
https://rbonichon.github.io/asi36/2019/01-chapter02.pdf
http://n3ko1.github.io/tags.html
https://insuyun.github.io/publication/
https://argp.github.io/
https://aidenpearce369.github.io/categories/
https://jys0710.github.io/
https://guyinatuxedo.github.io/next/index.html
https://n1ght-w0lf.github.io/binary%2520exploitation/heap-one/
https://guyinatuxedo.github.io/40-house_of_lore/house_lore_exp/index.html
https://google.github.io/security-research/pocs/linux/bleedingtooth/writeup.html
https://0x3f97.github.io/categories/
https://maheshhari.github.io/blog/babytcache/
https://zzm7000.github.io/teaching/2022fallcse410510/index.html
https://topicsec.github.io/posts/hacking-blind/
https://lkmidas.github.io/
https://a13xp0p0v.github.io/2021/02/09/CVE-2021-26708.html
https://1ce0ear.github.io/2017/11/26/study-house-of-orange/
https://zzm7000.github.io/teaching/2021fallcse410510/index.html
https://csea-iitb.github.io/IITBreachers-wiki/2020/07/23/Binary-Exploitation.html
https://phonexicum.github.io/infosec/reverse.html
https://guyinatuxedo.github.io/30-unlink/hitcon14_stkof/index.html
https://kaist-hacking.github.io/publication/
https://aidenpearce369.github.io/binary%2520exploitation/heap1/
https://hackyboiz.github.io/2021/02/28/l0ch/pwncoolsexy-part2/
https://alastairreid.github.io/RelatedWork/notes/automatic-exploit-generation/
http://n3ko1.github.io/posts.html
https://guyinatuxedo.github.io/27-edit_free_chunk/uaf_explanation/index.html
https://guyinatuxedo.github.io/27-edit_free_chunk/uaf_explanation/index.html
https://connormcgarr.github.io/swimming-in-the-kernel-pool-part-2/
https://argp.github.io/public/970a2d1ce20edee6eaf3b9cecd071f81.pdf
https://phi1010.github.io/2020-09-14-bget-exploitation/
https://maheshhari.github.io/blog/remain/
https://saaramar.github.io/exploit_pwn_chgs_ubuntu_21.10/
https://aidenpearce369.github.io/binary%2520exploitation/heap0/
https://googleprojectzero.github.io/0days-in-the-wild/0day-RCAs/2019/CVE-2019-7287.html
https://saaramar.github.io/iBoot_firebloom/
https://guyinatuxedo.github.io/31-unsortedbin_attack/hitcon_magicheap/index.html
https://blackbeard666.github.io/
https://madaidans-insecurities.github.io/firefox-chromium.html
https://pedro-bernardo.github.io/
https://billyotry.github.io/2021/07/17/Educational%2520Heap%2520Exploitation%25202.0%2520(how2heap%2520glibc%25202.31)/
https://angelosk.github.io/Papers/2014/ret2dir.pdf
https://guyinatuxedo.github.io/43-house_of_orange/house_orange_exp/index.html
https://googleprojectzero.github.io/0days-in-the-wild/0day-RCAs/2020/CVE-2020-16010.html
https://mudongliang.github.io/files/papers/GREBE.pdf
https://a13xp0p0v.github.io/img/CVE-2021-26708.pdf
https://ctsrd-cheri.github.io/cheri-exercises/missions/use-after-free-control-flow/index.html
https://snf.github.io/2017/05/04/exploit-protection-i-page-heap/
https://wcventure.github.io/FuzzingPaper/Paper/CCS18_Revery.pdf
https://aidenpearce369.github.io/binexp/
https://samiux.github.io/ctf-pwn.html
https://argp.github.io/public/3f7f268d4896869a6634f76403e5954b.pdf
http://hatriot.github.io/blog/2021/03/10/on-exploiting-cve-2021-1648
https://guyinatuxedo.github.io/17-stack_pivot/insomnihack18_onewrite/index.html
https://multics69.github.io/pages/pubs/vip-ismail-ccs21.pdf
https://teamrocketist.github.io/2019/10/27/Pwn-BackdoorCtf-2019-Baby-Heap/index.html
https://guyinatuxedo.github.io/30-unlink/zctf16_note2/index.html
https://mauronz.github.io/
https://lifeasageek.github.io/class/cs52700-fall16/pages/lab-2.html
http://struct.github.io/
https://lifeasageek.github.io/static/cv.pdf
https://aidenpearce369.github.io/tags/
https://connormcgarr.github.io/type-confusion-part-3/
https://guyinatuxedo.github.io/45-automatic_exploit_generation/index.html
https://rbonichon.github.io/asi36/2020/01-lecture02.pdf
https://richard-ac.github.io/posts/sudo-cve/
https://desword.github.io/paper/ref/KEPLER%25E5%2586%2585%25E6%25A0%25B8%25E6%258E%25A7%25E5%2588%25B6%25E6%25B5%2581%25E5%258A%25AB%25E6%258C%2581_%25E4%25BF%25A1%25E5%25B7%25A5%25E6%2589%2580_usenix19.pdf
https://mauronz.github.io/userafterfree-writeup/
https://guyinatuxedo.github.io/00-intro/index.html
https://mem2019.github.io/jekyll/update/2022/02/06/DiceCTF-Memory-Hole.html
https://cs155.github.io/Spring2019/lectures/02-ctrl-hijacking.pdf
https://carrv.github.io/2022/papers/CARRV2022_paper_5_Kim.pdf
https://richard-ac.github.io/tags/heap/
https://cs155.github.io/Spring2019/papers/formatstring-1.2.pdf
https://thomasdullien.github.io/about/
https://h3xduck.github.io/vulns/2021/08/22/eternalblue-part8.html
https://dplastico.github.io/sin%2520categor%25C3%25ADa/2021/10/17/Learning-Double-Restrictions-The-house-of-plastic-cake.html
https://kileak.github.io/ctf/2022/zer0pts-kvstore/
https://lifeasageek.github.io/papers/yoochan-exprace.pdf
https://maheshhari.github.io/blog/babyheap/
https://r888800009.github.io/software/security/binary/heap/
https://struct.github.io/oilpan_metadata.html
https://guyinatuxedo.github.io/33-custom_misc_heap/csaw19_traveller/index.html
https://mem2019.github.io/jekyll/update/2019/07/12/Roll-A-D8.html
https://mem2019.github.io/jekyll/update/2021/10/31/HackLu2021-Stonks-Socket.html
https://hackyboiz.github.io/2021/03/28/l0ch/pwncoolsexy-part3/
https://volticks.github.io/memory-heist-writeup/
https://guyinatuxedo.github.io/26-heap_grooming/pico_areyouroot/index.html
https://mdanilor.github.io/posts/memory-protections/
https://microsoftedge.github.io/edgevr/posts/yet-another-uaf/
https://barbieauglend.github.io/talks/
https://ajax4sec.github.io/papers/sec17-jia.pdf
https://richard-ac.github.io/tags/exploits/
https://twisted-fun.github.io/2018-09-18-CSAWCTF18-PWN-400/
https://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2021/CVE-2021-1647.html
https://mtalbi.github.io/ps4,/exploit,/webkit/2020/12/11/this-is-for-the-pwners.html
https://wapiflapi.github.io/
https://theromanxpl0it.github.io/misc.html
https://milotruck.github.io/blog/Binary-Exploitation-Techniques/
https://doar-e.github.io/blog/2016/12/21/happy-unikernels/
https://syst3mfailure.github.io/
https://saaramar.github.io/str_repeat_exploit/
https://binsec.github.io/assets/publications/papers/2016-ssprew.pdf
https://0x3f97.github.io/heap-exploitation/2017/12/06/glibc-heap-analysis/
https://gururaj-s.github.io/assets/pdf/DSN21_Boivie.pdf
https://teamrocketist.github.io/2019/12/26/Pwn-Kipod2019-CloneWarS/
https://qkaiser.github.io/security/2021/04/25/orange/
https://jhalon.github.io/chrome-browser-exploitation-1/
https://rbonichon.github.io/teaching/2019/asi36/
https://diabolo94.github.io/2017/12/10/utimatebinary/
https://lifeasageek.github.io/
https://fineas.github.io/FeDEX/post/chromium_rce.html
https://dplastico.github.io/2022/05/25/Apocalypse_ctf.html
https://zzm7000.github.io/teaching/2021springcse703/papers/sec20-chen-weiteng.pdf
https://theofficialflow.github.io/2019/06/18/trinity.html
https://null2root.github.io/blog/2020/02/07/LazyFragmentationHeap-WCTF2019-writeup.html
https://jinb-park.github.io/leak-kptr.pdf
http://abatchy17.github.io/2017/06/exploit-dev-101-bypassing-aslr-on.html
https://rbonichon.github.io/teaching/2020/asi36/
https://bazad.github.io/
https://docfate111.github.io/blog/securityresearch/2021/11/08/SLUBoverflow.html
https://tanu1208.github.io/media/summaries/IN5290%2520-%2520Ethical%2520Hacking.pdf
https://guyinatuxedo.github.io/18-ret2_csu_dl/index.html
https://syst3mfailure.github.io/hotrod
https://guyinatuxedo.github.io/29-tcache/tcache_explanation/index.html
https://guyinatuxedo.github.io/28-fastbin_attack/csaw17_auir/index.html
https://guyinatuxedo.github.io/28-fastbin_attack/explanation_fastbinAttack/index.html
https://struct.github.io/partition_alloc.html
https://a13xp0p0v.github.io/2017/03/24/CVE-2017-2636.html
https://teamrocketist.github.io/2018/11/08/Pwn-inCTF-2017-Gryffindor/
https://coldfusionx.github.io/posts/LameHTB/
https://doar-e.github.io/blog/2018/11/19/introduction-to-spidermonkey-exploitation/
https://theguly.github.io/2020/02/eLearnSecurity-eXploit-Development-Student/
https://lallodi.github.io/publications/cset-13.pdf
https://doar-e.github.io/category/exploitation.html
https://guyinatuxedo.github.io/32-largebin_attack/largebin_explanation1/index.html
https://zzm7000.github.io/teaching/2021springcse703/papers/sec18-wu_0.pdf
https://tcode2k16.github.io/blog/posts/picoctf-2019-writeup/binary-exploitation/
https://changochen.github.io/2018-11-09-hctf.html
https://blackbeard666.github.io/pwn_exhibit/content/2021_CTF/securinets_qualsCTF/killshot_writeup.html
https://vkili.github.io/blog/binary%2520exploitation/protecting-binaries/
https://schlafwandler.github.io/posts/attacking-wine-part-i/
https://bitvijays.github.io/LFC-BinaryExploitation.html
https://cturt.github.io/sendmsg.html
https://richard-ac.github.io/
https://0xrick.github.io/binary-exploitation/bof5/
https://haehyun.github.io/papers/leak-kptr-woot20.pdf
https://larryxi.github.io/2018/07/11/reviewing-netgear-wnr2200-heap-overflow/
https://y3a.github.io/2021/04/17/ctf-sg-heap-fengshui/
https://0x09al.github.io/security/ctp/osce/exploitation/2017/07/06/osce-ctp-prep-heapspreay-seh-egghunter.html
https://guyinatuxedo.github.io/37-fs_exploitation/swamp19_badfile/index.html
https://expend20.github.io/2018/06/26/google-sftp.html
http://0xd3xt3r.github.io/
https://vigneshsrao.github.io/posts/memoheap/
https://wooseunghoon.github.io/assets/papers/DSN21.pdf
https://googleprojectzero.github.io/0days-in-the-wild/rca.html
https://guyinatuxedo.github.io/24-heap_overflow/protostar_heap1/index.html
https://pr0cf5.github.io/ctf/2020/03/09/the-plight-of-tty-in-the-linux-kernel.html
https://rbonichon.github.io/teaching/2018/asi36/
https://saelo.github.io/presentations/bluehat_il_22_a_brief_history_of_imessage_exploitation.pdf
https://cturt.github.io/ps4-3.html
https://ruia-ruia.github.io/2022/08/05/CVE-2022-29582-io-uring/
https://ctsrd-cheri.github.io/cheri-exercises/exercises/cheri-allocator/index.html
https://wapiflapi.github.io/2014/04/30/getting-a-shell-on-fruits-bkpctf-2014.html
https://sectt.github.io/writeups/Plaid19/splaid_birch/README
https://kiror0.github.io/ctf/
https://alastairreid.github.io/RelatedWork/papers/heelan:msc:2009/
https://guyinatuxedo.github.io/24-heap_overflow/protostar_heap2/reamdme.html
https://nightrainy.github.io/2019/08/07/play-withe-file-structure-%25E6%2590%25AC%25E8%25BF%2590/
https://trailofbits.github.io/ctf/exploits/references/no-nx.pdf
https://7rocky.github.io/en/
https://guyinatuxedo.github.io/38-grab_bad/hackim19_shop/index.html
https://dmxcsnsbh.github.io/2020/07/20/0CTF-TCTF-2020-Chromium-series-challenge/
https://blackbeard666.github.io/pwn_exhibit/content/2020_CTF/NACTF/pwn_cttt/cttt_writeup.html
https://thalium.github.io/blog/posts/deserialization-bug-through-rdp-smart-card-extension/
https://gururaj-s.github.io/assets/slides/DSN21_Boivie_slides.pdf
http://a7um.github.io/2017/11/08/babyfs/
https://ret2school.github.io/post/cheapie/
https://aaronbloomfield.github.io/ics/slides/binary-exploits.html
https://qkaiser.github.io/publications/
https://saaramar.github.io/IOMFB_integer_overflow_poc/
https://maheshhari.github.io/blog/sleepyholder/
https://doar-e.github.io/blog/2013/09/09/pinpointing-heap-related-issues-ollydbg2-off-by-one-story/
https://guyinatuxedo.github.io/35-integer_exploitation/int_overflow_post/index.html
https://a13xp0p0v.github.io/2020/02/15/CVE-2019-18683.html
https://vkili.github.io/blog/binary%2520exploitation/buffer-overflow/
https://pr0cf5.github.io/ctf/2020/02/09/exploiting-a-bug-in-radare-plugin.html
https://gloxec.github.io/2019/04/08/MacOS%2520Heap%2520Exploit/
https://noobfrompitt.github.io/protostar-stack0/
https://cturt.github.io/dlclose-overflow.html
https://bazad.github.io/2018/07/xpc-string-leak/
https://losfuzzys.github.io/writeup/2016/09/25/dctfquals2016-warm-heap/
https://seb-sec.github.io/2019/10/29/picoctf2019.html
https://andreafioraldi.github.io/ctf/2018/06/29/google-ctf-2018-sftp.html
https://hxuhack.github.io/lecture/software_sec/Chp08.1-Rust.pptx
https://0xrick.github.io/binary-exploitation/bof3/
https://paulsec.github.io/posts/corelan-bootcamp-review-2018/
https://huhong789.github.io/papers/ding:desensitization.pdf
https://argp.github.io/2010/04/26/kernel-exploitation-mitigations/
https://connormcgarr.github.io/ROP/
http://xiaofen9.github.io/blog
https://hardenedlinux.github.io/system-security/2016/01/19/an-introduction-to-linux-kernel-exploitation.html
https://salls.github.io/Linux-Kernel-CVE-2017-5123/
https://twisted-fun.github.io/2018-05-24-RCTF18-PWN-317/
https://larryxi.github.io/2018/03/28/mbe-lab7-heap-exploitation-write-up/
https://mtalbi.github.io/heap-based/overflow,/exploits/2017/09/16/the-macabre-dance-of-memory-chunks.html
https://gperftools.github.io/gperftools/heapprofile.html
https://a13xp0p0v.github.io/img/Alexander_Popov-Race_for_Root_SHA2017.pdf
https://0xrick.github.io/binary-exploitation/bof1/
https://kyuhlee.github.io/publications/ndss17_1.pdf
https://tcode2k16.github.io/blog/posts/picoctf-2018-writeup/binary-exploitation/
https://jonatanhal.github.io/2016/02/14/protostar-heap.html
https://saelo.github.io/posts/firefox-script-loader-overflow.html
https://vigneshsrao.github.io/posts/lost/
https://argp.github.io/2018/09/06/heaphopper/
https://vishnudevtj.github.io/notes/qemu-vm-escape-cve-2019-14378
https://lkmidas.github.io/posts/20210223-linux-kernel-pwn-modprobe/
https://tyeyeah.github.io/2021/05/12/2021-05-12-Heap-Exploit-Intro/
https://topologyeyewear.github.io/engineering-blog/2018/03/19/heap_corruption_followup/
https://connormcgarr.github.io/Kernel-Exploitation-1/
https://cr0mll.github.io/cyberclopaedia/Reconnaissance/Active/index.html

Vickblöm

Research scattered with thoughts, ideas, and dreams

Penetration Testing Lab

Offensive Techniques & Methodologies

Astr0baby's not so random thoughts _____ rand() % 100;

@astr0baby on Twitter for fresh randomness

The Data Explorer

playing around with open data to learn some cool stuff about data analysis and the world

Conorsblog

Data | ML | NLP | Python | R

quyv

Just a thought

IFT6266 - H2017 Deep Learning

A Graduate Course Offered at Université de Montréal

Deep Learning IFT6266-H2017 UdeM

Philippe Paradis - My solutions to the image inpainting problem

IFT6266 – H2017 DEEP LEARNING

Pulkit's thoughts on the course project

Thomas Dinsmore's Blog

No man but a blockhead ever wrote except for money -- Samuel Johnson

the morning paper

a random walk through Computer Science research, by Adrian Colyer

The Spectator

Shakir's Machine Learning Blog