Explore >> Select a destination


You are here

blog.redcrowlab.com
| | cocomelonc.github.io
3.2 parsecs away

Travel
| | [AI summary] The article explains how to write and execute shellcode on macOS using Assembly and C, highlighting differences from Linux and the need for mmap to allocate executable memory.
| | michaelneuper.com
2.5 parsecs away

Travel
| | A buffer overflow attack is a type of cyber attack in which an attacker attempts to write more data to a buffer (a temporary data storage area) in a computer's memory than the buffer is designed to hold. This can cause the buffer to overflow, or exceed its maximum capacity, which can corrupt other parts of the computer's memory and allow the attacker to gain unauthorized access to the system.
| | rog3rsm1th.github.io
2.9 parsecs away

Travel
| | A tutorial on how to find memory corruption bugs in Python
| | evilcookie.de
24.2 parsecs away

Travel
| [AI summary] A guide on using GDB to debug C programs, focusing on segmentation faults and division by zero errors.