Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

New posts in exploit

Testing for security vulnerabilities on web applications

Is this code an exploit? What is this code?

php exploit shellcode

exploiting Buffer Overflow using gets() in a simple C program

c buffer-overflow exploit gets

Is PHP immune to "HTTP Response Splitting" vulnerabilities?

How can I explain the behavior of the following shellcode exploit?

Is it possible to overwrite %eax using buffer overflow?

What exactly does this PHP exploit code (found on my app)?

php exploit

Why is the heap in Go executable?

What does int (*ret)() = (int(*)())code mean?

c exploit shellcode

Why does fireshepard kill firesheep?

security exploit

why will my buffer overflow exploit open a user shell only instead of a root shell?

Return into libc - Illegal instruction

Format string exploit ends in segfault

Executing JavaScript from Flex: Is this javascript function dangerous?

Trying to smash the stack

c gcc stack-overflow gnu exploit

x86 Assembly Why use Push/Pop instead of Mov?

assembly x86 exploit shellcode

Is it safe to redirect to an url like so: "https://example.com/" + userData?

http-redirect exploit

How is the modified return address in a stack based buffer overflow attack approximated?

I don't understand this Code

javascript security exploit