Recommended articles, papers, and references.
https://darkmentor.com/prior-work/
https://darkmentor.com/publication/
https://www.anonymoushackers.net/category/cybersecurity-news/
https://www.crowdstrike.com/explore/2025-global-threat-report
https://genai.owasp.org/resource/genai-red-teaming-guide/
https://connormcgarr.github.io/
https://security.stackexchange.com/questions/18556/how-do-aslr-and-dep-work
https://www.exploit-db.com/docs/english/17914-bypassing-aslrdep.pdf → Whitepaper on Bypassing ASLR/DEP
https://www.blackhat.com/docs/us-15/materials/us-15-Zhang-Bypass-Control-Flow-Guard-Comprehensively-wp.pdf → Bypass Control Flow Guard Comprehensively
https://cturt.github.io/articles.html → Console Exploitation