Search code examples
Why does fgets fail when I use 0 as FILE* to read from stdin in rop chain?...


stack-overflowexploit

Read More
Sending escaped hex string in raw_input variable over socket doesn't work?...


pythonpython-2.7hexbuffer-overflowexploit

Read More
My buffer overflow exploit only opens a regular user shell but not a root shell...


crootbuffer-overflowexploitaslr

Read More
Shellcode as payload for buffer overflow (or other) exploits executed as root?...


securitybufferbuffer-overflowexploitshellcode

Read More
can anyone explain this code to me?...


cstackexploitshellcode

Read More
Is `Object.fromEntries()` secure from prototype pollution?...


javascriptsecurityprototypeexploit

Read More
Python writing incorrect hex values...


pythonexploit

Read More
How to find address of the environment variables in Linux...


linuxenvironment-variablesbuffer-overflowexploitshellcode

Read More
Format string exploit length...


csecuritystring-formattingexploitformat-string

Read More
gdb reads wrong input(stdin) values...


pythoncinputgdbexploit

Read More
How to disable the warning about using deprecated gets in GCC?...


cgccexploitgcc-warninggets

Read More
Double Free - crash or no crash...


linuxexploitcglibc

Read More
Simple ROP chain with 2 arguments to the function...


cbinarybuffer-overflowexploit

Read More
Differences in executables produced by different C compilers...


csecuritygccexploitcl

Read More
Return oriented programming with arguments using arbitrary EBP...


cx86exploit

Read More
32 bit shellcode causes a segmentation fault when trying to push "/bin//sh" to the stack...


clinuxsecurityassemblyexploit

Read More
Why does this exploit require two separate payload injections rather than one?...


cexploitgetsctf

Read More
In a similar manner as SQL injection, is it possible to exploit text-entry fields?...


websql-injectionexploitweb-testing

Read More
Bash Syntax Problems for Exploit...


linuxbashsyntaxexploitshellcode

Read More
shellcode is truncated by \x20...


exploitshellcodewinexe

Read More
Will AddressSanitizer still report use-after-free if there is a new object allocated at where the da...


securityfirefoxexploitaddress-sanitizer

Read More
Writing Secure C and Secure C Idioms...


csecuritybuffer-overflowexploit

Read More
Smashing the Stack - Trouble finding return address...


cexploit

Read More
Format string exploit ends in segfault...


cpathformattingenvironment-variablesexploit

Read More
Paragraph(<p>) nesting by jquery html() and load() methods...


jqueryhtmlajaxexploitparagraph

Read More
Increasing the length of md5 output...


algorithmsecurityhashreverse-engineeringexploit

Read More
Is there a way to completely disable gdb output?...


c++gdbreverse-engineeringexploit

Read More
Buffer overflow: overrwrite CH...


gccassemblyx86buffer-overflowexploit

Read More
How is memory assigned C?...


gccassemblyx86gdbexploit

Read More
How does this milw0rm heap spraying exploit work?...


javascriptx86exploitassembly

Read More
BackNext