Focused on the ongoing discussion and documentation of vulnerabilities and exploitation techniques. Please read the rules before posting here.
I m bit curious to learn about kernel exploits. For resources only , Thanks.