NoSociety.de

#nosoc

  • Page Tools
    Show pageOld revisionsBacklinks
  • Site Tools
    Recent ChangesMedia ManagerSitemap
  • User Tools
    Log In

Search

You can find the results of your search below.

Contains
  • Exact match
  • Starts with
  • Ends with
  • Contains
@en:it-security:blog
  • Any namespace
Any time
  • Any time
  • Past week
  • Past month
  • Past year
Sort by hits
  • Sort by hits
  • Sort by last modified

Fulltext results:

Buffer overflow in the 64-bit stack - Part 2
2 Hits, Last modified: 16 months ago
he basics of buffer overflows can be found in the link collection at the end. ((https://book.hacktricks.... code using "-no-pie" as compile flag to tell the linker you want to build an executable. This should re
Buffer overflow in the 64-bit stack - Part 3
2 Hits, Last modified: 16 months ago
is started. === PLT and GOT === PLT (Procedure Linkage Table) and GOT (Global Offset Table) are responsible for the interaction during dynamic linking. The function ''write()'' function does not po
The importance of awareness in IT security
1 Hits, Last modified: 17 months ago
ps://pixabay.com/de/users/geralt-9301/?utm_source=link-attribution&utm_medium=referral&utm_campaign=imag
Obfuscation: Disguise shellcode as UUIDs
1 Hits, Last modified: 4 months ago
nction ''%%memcpy%%'' is not called directly, but linked to our own function via a pointer. <code cpp>