Questions
Linux
Laravel
Mysql
Ubuntu
Git
Menu
HTML
CSS
JAVASCRIPT
SQL
PYTHON
PHP
BOOTSTRAP
JAVA
JQUERY
R
React
Kotlin
×
Linux
Laravel
Mysql
Ubuntu
Git
New posts in shellcode
Need to exploit buffer overflow. Can't figure out how to uncorrupt the stack after executing exploit code?
Aug 17, 2022
assembly
stack-overflow
exploit
shellcode
Difference between declaring shellcode as a char[] array and char*?
Nov 10, 2022
c
arrays
pointers
shellcode
Exactly what cases does the gcc execstack flag allow and how does it enforce it?
Oct 31, 2022
c
linux
gcc
x86
shellcode
Difference between - buffer overflow and return to libc attack
Sep 24, 2022
c
security
buffer-overflow
shellcode
is it possible to make a function execute code from a string on the stack?
Oct 14, 2022
c
shellcode
Perl's Pack('V') function in Python?
Oct 23, 2022
python
perl
exploit
pack
shellcode
why can't Javascript shellcode exploits be fixed via "data execution prevention"?
Mar 19, 2020
javascript
exploit
shellcode
data-execution-prevention
Loading raw code from C program
Jun 04, 2022
c
linux
assembly
system-calls
shellcode
Why can the execve system call run "/bin/sh" without any argv arguments, but not "/bin/ls"?
Aug 21, 2022
c
linux
system-calls
glibc
shellcode
How to get c code to execute hex machine code?
Apr 04, 2020
c
assembly
x86
x86-64
shellcode
Testing a shellcode
Oct 25, 2022
c
shellcode
Shellcode in C - What does this mean?
Nov 15, 2022
c
shellcode
Shellcode in C program
Nov 12, 2022
c
shellcode
can anyone explain this code to me?
Oct 25, 2022
c
stack
exploit
shellcode
Shellcode for a simple stack overflow: Exploited program with shell terminates directly after execve("/bin/sh")
Mar 31, 2022
security
assembly
buffer-overflow
shellcode
Linux Shellcode "Hello, World!"
Dec 17, 2021
c
linux
assembly
nasm
shellcode
« Newer Entries