|
You are here |
napongizero.github.io | ||
| | | | |
syprog.blogspot.com
|
|
| | | | | Source code for this article may be found here . The problem of software security has already been raised in my previous articles more ... | |
| | | | |
karmanyaah.malhotra.cc
|
|
| | | | | [AI summary] The user provided a detailed write-up of their experience solving various pwn challenges in the bcactf 2022 competition. They described the techniques used for each challenge, including format string exploits, ROP chains, and libc leak methods. The write-up also mentions the final score and the team's placement in the high school division. | |
| | | | |
mem2019.github.io
|
|
| | | | | 0x00 Introduction | |
| | | | |
www.collabora.com
|
|
| | | Interested in learning more about low-level specifics of the eBPF stack? Read on as we take a deep dive, from its VM mechanisms and tools, to running traces on remote, resource-constrained embedded devices. | ||