Explore >> Select a destination


You are here

blog.nuculabs.dev
| | mouha.be
2.2 parsecs away

Travel
| | [AI summary] The blog post introduces buffer overflow attacks on Linux x86-64 platforms, explaining how to generate and execute shellcode using tools like Docker and mprotect() to bypass stack protection mechanisms.
| | blog.nuculabs.de
1.9 parsecs away

Travel
| | Hello, Here are my write-ups for the X-MAS CTF 2019 organized by . Reversing: Santa's crackme Santa's crackme is easy to solve when using Ghidra, all you need to do is open up the binary, read the code and use the XOR Memory script from Ghidra. The flag is retrieved from flag_matrix and xored by 3. Select the flag data, right click on Script Manager and execute the XorMemory script We get the flag, except for the first character
| | satharus.me
2.5 parsecs away

Travel
| | I wrote this post back in late May 2019 but hadn't published it and I don't really remember why I didn't. It was supposed to be a follow up for the post on t...
| | blog.nelhage.com
23.8 parsecs away

Travel
| tl;dr "Transparent Hugepages" is a Linux kernel feature intended to improve performance by making more efficient use of your processor's memory-mapping hardware. It is enabled ("enabled=always") by default in most Linux distributions. Transparent Hugepages gives some applications a small performance improvement (~ 10% at best, 0-3% more typically), but can cause significant performance problems, or even apparent memory leaks at worst. To avoid these problems, you should set enabled=madvise on your server...