You are here |
leethax0.rs | ||
| | | |
www.jaybosamiya.com
|
|
| | | | In this challenge, we had to obtain remote code execution, simply by exploiting a 1-day bug that forgot the difference between -0 and +0. This has probably been one of the most difficult, fun, and frustrating bugs I have ever exploited. | |
| | | |
mem2019.github.io
|
|
| | | | This weekend I have played Google CTF with r3kapig. On the first day I tried the OCR challenge but failed to solve it, and on the second day I spent the whol... | |
| | | |
www.dashlane.com
|
|
| | | | Explore the inner workings of the V8 JavaScript engine, from data types to memory allocation. Gain insights into tagged pointers, hidden classes, and optimization techniques for enhanced JavaScript performance. | |
| | | |
mrale.ph
|
|
| |