Search code examples
Are Windows or custom messages requiring updating pointers exploitable?...

windowswinapimessagingexploit

Read More
What is vulnerable about this C code?...

clinuxsecurityexploitsecure-coding

Read More
JMP rel16 (instead of JMP rel32)...

assemblyx86exploitopcode

Read More
Assembly Return Address Replace...

assemblyx86exploit

Read More
Get trace call list of PHP eval or override it manually...

phpevalexploit

Read More
Is it safe to redirect to an url like so: "https://example.com/" + userData?...

http-redirectexploit

Read More
How do I get admin access by exploiting this code?...

pythonpython-3.xexploit

Read More
Unable to inject valid instruction pointer during exploit...

cassemblystack-overflowexploitpwntools

Read More
Register window in blank on immunity debugger...

debuggingftpexploit

Read More
How do I send raw bytes interactively for a buffer overflow exploit?...

cbashstdinbuffer-overflowexploit

Read More
Return address in stack before function call: To which segment points the return address?...

creturnbuffer-overflowexploit

Read More
Can not understand how my shellcode works. Shellcode for windows OS( not Linux!) to open calc.exe...

windowsassemblyx86exploitshellcode

Read More
ARM: ROP chain: Stack overflow fails on specific address...

armbuffer-overflowexploit

Read More
Why do I get a segmentation fault when attempting to execute an instruction writing to memory when t...

linuxsegmentation-faultgdbx86-64exploit

Read More
If a user had access to the terminal in a docker container can they do anything to destroy the hard ...

dockersecurityexploit

Read More
Are java exploits based off of the jre used to run the application or the jdk used to compile the co...

javasecurityexploit

Read More
Safe Use of strcpy...

c++strcpyexploit

Read More
Overwriting data via array vulnerabilities...

c++arraysmemorybuffer-overflowexploit

Read More
MongoDB $regex query and potential exploits...

regexmongodbbacktrackingexploit

Read More
Confused by a python -c printing command "\xef\xbe\xad\xde" what does it mean?...

pythoncprintingstackexploit

Read More
Why is the heap in Go executable?...

gomemory-managementoperating-systemheap-memoryexploit

Read More
Is using `eval` to define functions with text from a file evil?...

shellevalexploit

Read More
Aleph one code - buffer overflow...

cassemblybuffer-overflowexploitshellcode

Read More
Kernel space memory layout...

linuxoperating-systemkernelexploitassemble

Read More
c++ -successfully printing out of range string indexes...

c++stringsegmentation-faultexploit

Read More
How can I explain the behavior of the following shellcode exploit?...

assemblyx86buffer-overflowexploitshellcode

Read More
Code execution exploit Cortex M4...

armexploitcortex-m

Read More
What can be inputted in the following program to access the array?...

c++exploit

Read More
Segmentation Fault ret2libc attack...

segmentation-faultexploit

Read More
Difference between scanf's width specification and scanf_s...

cscanfbuffer-overflowexploittr24731

Read More
BackNext