Linking pages
- Exploiting the Starcraft 1 EUD Bug https://zeta-two.com/software/exploit/2020/04/05/exploiting-starcraft1.html 8 comments
- mast1c0re: Part 3 – Escaping the emulator – McCaulay https://mccaulay.co.uk/mast1c0re-part-3-escaping-the-emulator/ 7 comments
- A step-by-step introduction to the use of ROP gadgets to bypass DEP – CYBER GEEKS https://cybergeeks.tech/a-step-by-step-introduction-to-the-use-of-rop-gadgets-to-bypass-dep/ 2 comments
- Kernel exploitation: weaponizing CVE-2020-17382 MSI Ambient Link driver :: — uf0 https://www.matteomalvica.com/blog/2020/09/24/weaponizing-cve-2020-17382/ 1 comment
- GitHub - REMath/literature_review: Survey of program analysis research with a focus on machine code https://github.com/REMath/literature_review 0 comments
Linked pages
Related searches:
Search whole site: site:github.com
Search title: GitHub - 0vercl0k/rp: rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.
See how to search.