All Entries
Browse the complete catalog of attack techniques and their defensive responses.
Cloud Storage Phishing Hosting
🟡 LimitedHosting phishing pages on trusted cloud storage (GCS, S3, Azure Blob) to bypass URL reputation filters; still active but detection improving.
Stack Buffer Overflow (Vanilla)
🔴 DeadClassic memory corruption via stack smashing; killed by DEP, ASLR, and stack canaries becoming default OS protections.