421 views
Mahmoud Jadaan
Linux Kernel Exploitation: Return to Userland 2_Reverse Engineering hackme.ko
Login with Google Login with Discord