|
You are here |
tcode2k16.github.io | ||
| | | | |
blog.nuculabs.de
|
|
| | | | | Hello, Here are my write-ups for the X-MAS CTF 2019 organized by . Reversing: Santa's crackme Santa's crackme is easy to solve when using Ghidra, all you need to do is open up the binary, read the code and use the XOR Memory script from Ghidra. The flag is retrieved from flag_matrix and xored by 3. Select the flag data, right click on Script Manager and execute the XorMemory script We get the flag, except for the first character | |
| | | | |
blog.keras.io
|
|
| | | | | [AI summary] This blog post provides a tutorial on deploying a Keras deep learning model as a REST API using Flask, covering model loading, image preprocessing, API creation, and testing with cURL and Python. | |
| | | | |
michaelneuper.com
|
|
| | | | | A buffer overflow attack is a type of cyber attack in which an attacker attempts to write more data to a buffer (a temporary data storage area) in a computer's memory than the buffer is designed to hold. This can cause the buffer to overflow, or exceed its maximum capacity, which can corrupt other parts of the computer's memory and allow the attacker to gain unauthorized access to the system. | |
| | | | |
boxbase.org
|
|
| | | I came up with an idea when studying type theory. I am a vehement proponent of dynamic typing but there are several ideas that require me to explore into type theory so I am studying it. | ||