Data Execution Prevention
And how attackers can bypass DEP to achieve code execution.
And how attackers can bypass DEP to achieve code execution.
And how printing a string led to code execution?!!
And how the Heartbleed bug works!
And how a jammed laptop key led to code execution?!!
How To Patch Binaries For Hackers And Pen Testers.
Analyzing and Hacking Binaries with Ghidra.
Useful tips to up your Bash game.
Writing functions to simplify your script.