|
You are here |
xnacly.me | ||
| | | | |
jbytecode.github.io
|
|
| | | | | ||
| | | | |
www.productive-cpp.com
|
|
| | | | | In the first part of this series we discussed the mechanics of an exploit, the general concept of hardening, and the stack protector hardening technique in particular. Some of the concepts explained there will be | |
| | | | |
kokada.dev
|
|
| | | | | ||
| | | | |
timelessname.com
|
|
| | | [AI summary] The article details the author's process of creating the smallest possible x86 ELF binary that outputs 'Hello World' on Ubuntu Linux, involving C, assembly, and hex editing to minimize the file size. | ||