|
You are here |
modexp.wordpress.com | ||
| | | | |
binarydebt.wordpress.com
|
|
| | | | | System call table is an array of function pointers. It is defined in kernel space as variable sys_call_table and it contains pointers to functions which implement system calls. Index of each function pointer in the array is the system call number for that syscall. These are denoted by NR_* macros in header files, such as... | |
| | | | |
mdanilor.github.io
|
|
| | | | | A beginers guide into a Windows kernel stack overflow vulnerability from zero to advanced bypasses. | |
| | | | |
scorpiosoftware.net
|
|
| | | | | The Application Verifier tool that is part of the Windows SDK provide a way to analyze processes for various types of misbehavior. The GUI provided looks like the following: Application Verifier application window To add an application, you can browse your file system and select an executable. The Application Verifier settings are based around the... | |
| | | | |
releasethemargins.wordpress.com
|
|
| | | In reading a story about the tragic shooting at a garlic festival in Ca today, I came across a telling statistic of the state of our country these days... "It was the 246th mass shooting in the US this year, according to US tracking website Gun Violence Archive." ...because our government doesn't track such things,... | ||