|
You are here |
healeycodes.com | ||
| | | | |
blog.nuculabs.de
|
|
| | | | | I always wanted to play around with a binary analysis framework but most of the time I was turned off by how difficult it was to install and use it. Just recently I've thought to give angr a try and now I want to share my experience with you! I will present you a two scripts that solve two challenges, if you wish to dig deeper and learn Angr then you should visit it's official documentation. | |
| | | | |
nenadnoveljic.com
|
|
| | | | | The current implementation of the eBPF bcc tool killsnoop doesn't capture signals sent by the tgkill() system call. | |
| | | | |
binarydebt.wordpress.com
|
|
| | | | | System call table is an array of function pointers. It is defined in kernel space as variable sys_call_table and it contains pointers to functions which implement system calls. Index of each function pointer in the array is the system call number for that syscall. These are denoted by NR_* macros in header files, such as... | |
| | | | |
blankhorizons.com
|
|
| | | Meditations on consciousness by Kenneth Shinozuka. Sign up here: bit.ly/blankhorizons | ||