Search code examples
Systemtap: How to probe functions invoked mq_notify()...


kernelexploitsystemtap

Read More
Access module 'sys' without using import machinery...


pythonsandboxexploit

Read More
How do I create formatted javascript console log messages...


javascripthtmlgoogle-chromewebkitexploit

Read More
Prevent HTML to be displayed from $_GET method...


phphtmlcode-injectionexploit

Read More
How can I exploit Buffer Overflow on x86-64 Linux?...


assemblyx86-64buffer-overflowexploitshellcode

Read More
Attack Lab Phase 4: rdi gets the wrong value despite correct assembly being put on stack...


assemblyx86-64machine-codeexploitopcode

Read More
ret2libc strcpy not complete...


pythonassemblyx86glibcexploit

Read More
How to call the ctypes function from bytes in Python?...


pythoncross-platformctypesexploit

Read More
How do I successfully test this trivial buffer overflow written in C?...


clinuxbuffer-overflowexploit

Read More
Segmentation fault in C shellcode x64...


cbashexploitshellcode

Read More
Can string sanitisation via PHP's str_replace() be bypassed using multibyte or invisible charact...


phpsecurityreplaceexploit

Read More
After modifying msr[lstar], why the expected breakpoint cannot be hit?...


reverse-engineeringwindbgexploitwindows-kernelmsr

Read More
Shellcode stub got exited right after executed in Buffer Overflow Exploitation...


cstack-overflowreverse-engineeringbuffer-overflowexploit

Read More
Why is my stack filled with 0xc2 instructions when I passed the 0x90 instruction?...


pythonassemblybuffer-overflowexploit

Read More
Why does an empty method works like a sink in JavaScript?...


javascriptbrowserxssexploit

Read More
My flag is not displaying via terminal after completing an exploit in a ctf...


binaryreverse-engineeringexploitctfghidra

Read More
How to write a buffer-overflow exploit in GCC,windows XP,x86?...


cgccstackbuffer-overflowexploit

Read More
Is there a way to make GDB disassemble all memory in a specific range, without regard for instructio...


assemblyx86gdbexploitmachine-code

Read More
Can't understand the buffer overflow example in "The Art of Exploitation"...


securitybuffer-overflowexploitshellcode

Read More
Only "cat" command doesn't print any output after getting shell by pwntool...


python-3.xlinuxdockerexploitpwntools

Read More
Log4j vulnerability - Is Log4j 1.2.17 vulnerable (was unable to find any JNDI code in source)?...


javasecuritylog4jlog4j2exploit

Read More
Understanding of return address calculation from Hacking: the art of exploitation?...


cstack-overflowbuffer-overflowexploit

Read More
ret2libc: sh: line 1: command not found...


cbuffer-overflowlibcexploit

Read More
Can parameterized statement stop all SQL injection?...


sqlprepared-statementsql-injectioncode-injectionexploit

Read More
How to decode a PDF stream?...


pdfadobereverse-engineeringmalwareexploit

Read More
How to fix syntax Roblox Lua...


luarobloxexploitluau

Read More
What is the difference between an exploit and a compromise?...


securityexploit

Read More
x86 ebp's behavior in buffer overflow attack...


securitybuffer-overflowexploit

Read More
how to change stack protection via syscalls without parameters...


clinux-kernelx86system-callsexploit

Read More
Buffer overflow exploit...


csecurityexploit

Read More
BackNext