Cybersecurity Notes
CtrlK
MathematicsCryptography
  • Cybersecurity Notes
  • Binary Exploitation
    • Stack
      • Introduction
      • ret2win
      • De Bruijn Sequences
      • Shellcode
      • NOPs
      • 32- vs 64-bit
      • No eXecute
      • Return-Oriented Programming
      • Format String Bug
      • Stack Canaries
      • PIE
      • ASLR
      • GOT Overwrite
      • RELRO
      • Reliable Shellcode
      • One Gadgets and Malloc Hook
      • Syscalls
      • ret2dlresolve
      • ret2csu
      • Exploiting over Sockets
      • Forking Processes
      • Stack Pivoting
    • Heap
    • Kernel
    • Browser Exploitation
  • Reverse Engineering
    • Strings in C++
    • C++ Decompilation Tricks
    • Reverse Engineering ARM
  • Cryptography
    • Introduction
    • Number Theory Fundamentals
    • Continued Fractions
    • RSA
    • Diffie-Hellman Key Exchange
  • Blockchain
    • An Introduction to Blockchain
    • Smart Contracts and Solidity
    • Hosting a Testnet and Deploying a Contract
    • Interacting with Python
    • Ethereum Overview
  • Writeups
    • Hack The Box
    • picoGym
    • CTFs
  • Miscellaneous
    • pwntools
    • scanf Bypasses
    • Challenges in Containers
    • Using Z3
    • Cross-Compiling for arm32
Powered by GitBook
On this page

Was this helpful?

  1. Binary Exploitation

Stack

Introductionret2winDe Bruijn SequencesShellcodeNOPs32- vs 64-bitNo eXecuteReturn-Oriented ProgrammingFormat String BugStack CanariesPIEASLRGOT OverwriteRELROReliable ShellcodeOne Gadgets and Malloc HookSyscallsret2dlresolveret2csuExploiting over SocketsForking ProcessesStack Pivoting

Last updated 4 years ago

Was this helpful?