Explore >> Select a destination


You are here

nullset.xyz
| | unorde.red
6.9 parsecs away

Travel
| | [AI summary] A detailed writeup of solving the 'Bangalore' level in the Microcorruption CTF, focusing on bypassing Data Execution Prevention (DEP) through interrupt manipulation and shellcode execution.
| | michaelneuper.com
15.1 parsecs away

Travel
| | A buffer overflow attack is a type of cyber attack in which an attacker attempts to write more data to a buffer (a temporary data storage area) in a computer's memory than the buffer is designed to hold. This can cause the buffer to overflow, or exceed its maximum capacity, which can corrupt other parts of the computer's memory and allow the attacker to gain unauthorized access to the system.
| | tcode2k16.github.io
12.6 parsecs away

Travel
| | a random blog about cybersecurity and programming
| | blog.martinig.ch
25.9 parsecs away

Travel
| Architecture is an important asset for good programming and the notion of "pattern" is here to help us apply already trusted code architecture solutions to common problems. Jason McDonald has done a wonderful job to group some of them in a document that should be useful to most software developers. Go to his blog to