|
You are here |
www.catch22.net | ||
| | | | |
keithbabinec.com
|
|
| | | | | It is important for software engineers to understand how to analyze process dumps so that they can determine why their application is crashing or behaving unexpectedly. However, it can be hard to know where to start with the process. This post aims to be a starting point for a very common situation: debugging a crash... | |
| | | | |
mdanilor.github.io
|
|
| | | | | A beginers guide into a Windows kernel stack overflow vulnerability from zero to advanced bypasses. | |
| | | | |
scorpiosoftware.net
|
|
| | | | | Windows provides much of its functionality via kernel objects. Common examples are processes, threads, mutexes, semaphores, sections, and many more. We can see the object types supported on a particular Windows system by using a tool such as Object Explorer, or in a more limited way - WinObj. Here is a view from Object Explorer:... | |
| | | | |
www.codeotaku.com
|
|
| | | |||