Explore >> Select a destination


You are here

pwning.net
| | karmanyaah.malhotra.cc
2.5 parsecs away

Travel
| | [AI summary] The user provided a detailed write-up of their experience solving various pwn challenges in the bcactf 2022 competition. They described the techniques used for each challenge, including format string exploits, ROP chains, and libc leak methods. The write-up also mentions the final score and the team's placement in the high school division.
| | bijanebrahimi.github.io
3.7 parsecs away

Travel
| | [AI summary] This article explains how to set up a cross-compiler for FreeBSD on a Linux machine, detailing the necessary steps to configure and build the toolchain, including dependencies like binutils, GMP, MPFR, and MPC.
| | www.alfonsobeato.net
3.8 parsecs away

Travel
| |
| | membarrier.wordpress.com
23.6 parsecs away

Travel
| In the previous post we saw how the memory management unit (MMU) uses page tables to translate virtual addresses into physical ones. We will now consider the various features that such a translation enables in an operating system. In the discussion below, it is important to remember that the granularity of translation is a single...