We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
A series of programs that exploit innocuous programs into giving user root level control of system. Based on the famous Stanford test programs.
There was an error while loading. Please reload this page.