Binary Exploitation: Buffer Overflows
And how a jammed laptop key led to code execution?!!
Hi there! Welcome back to the binary exploitation series! In the coming posts, we are going to explore concepts and tricks used in binary exploitation.
Hi there! Welcome back to the binary exploitation series! In the coming posts, we are going to explore concepts and tricks used in binary exploitation.
--
Professional investigator of nerdy stuff. Hacks and secures. Creates god awful infographics. https://twitter.com/vickieli7
Love podcasts or audiobooks? Learn on the go with our new app.
Professional investigator of nerdy stuff. Hacks and secures. Creates god awful infographics. https://twitter.com/vickieli7