Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

New posts in shellcode

Why cast "extern puts" to a function pointer "(void(*)(char*))&puts"?

Execute shellcode by casting to function pointer in Visual C++

c++ casting shellcode

Python windows reverse shell one liner

python shellcode

Why am I getting a segmentation fault? (Testing Shellcode)

Executing shellcode in shared memory with mmap [duplicate]

c shared-memory mmap shellcode

The Art of Compiler on Buffer Overflow

buffer overflow example from Art of Exploitation book

Using buffer overflow to execute shell code

writing shellcode: why my shellcode won't work?

assembly x86-64 shellcode

Simple buffer overflow and shellcode example

Why I do get "Cannot find bound of current function" when I overwrite the ret address of a vulnerable program?

Need to exploit buffer overflow. Can't figure out how to uncorrupt the stack after executing exploit code?

Difference between declaring shellcode as a char[] array and char*?

c arrays pointers shellcode

Exactly what cases does the gcc execstack flag allow and how does it enforce it?

c linux gcc x86 shellcode

Difference between - buffer overflow and return to libc attack

is it possible to make a function execute code from a string on the stack?

c shellcode

Perl's Pack('V') function in Python?

why can't Javascript shellcode exploits be fixed via "data execution prevention"?

Loading raw code from C program