About Stack Smashing Protection (it uses Stackguard)
https://embeddedartistry.com/blog/2020/05/18/implementing-stack-smashing-protection-for-microcontrollers-and-embedded-artistrys-libc/
#pwn
https://embeddedartistry.com/blog/2020/05/18/implementing-stack-smashing-protection-for-microcontrollers-and-embedded-artistrys-libc/
#pwn
Embedded Artistry
Implementing Stack Smashing Protection for Microcontrollers (and Embedded Artistry’s libc) - Embedded Artistry
18 May 2020 by Phillip Johnston • Last updated 3 October 2022Stack buffer overflows are a category of error that can wreak havoc on our programs, resulting in sporadic crashes or strange and unexpected program behaviors. A stack buffer overflow occurs when…
👍1
Forwarded from vx-underground
If you're interested in keeping up with ransomware attacks and/or ransomware victims, a group of researchers have ported the vx-underground ransomware news bot over to Telegram
tl;dr monitors ransomware group sites near-in-real-time for latest listings
https://news.1rj.ru/str/RansomwareNewsVX
tl;dr monitors ransomware group sites near-in-real-time for latest listings
https://news.1rj.ru/str/RansomwareNewsVX
Telegram
Ransomware News (VX)
This is NOT the official channel of vx-underground.org /
Another ransom trackers:
https://news.1rj.ru/str/ransomlook
https://news.1rj.ru/str/ransomwarelive
Another ransom trackers:
https://news.1rj.ru/str/ransomlook
https://news.1rj.ru/str/ransomwarelive
👍2
This tool is written for inspecting undebuggable process
https://github.com/daem0nc0re/TangledWinExec/tree/main/ProcMemScan
#reverse
#malware_analysis
———
@islemolecule_source
https://github.com/daem0nc0re/TangledWinExec/tree/main/ProcMemScan
#reverse
#malware_analysis
———
@islemolecule_source
🔥1
I am working on a #red_team course. There are 3 prerequisites. The course is based on mitre tactics and I'm working on the simulations on techniques labs/material.
I am happy to hear your comments
credit : @soheilsec
https://gist.github.com/soheilsec/8310eea7913de6457f0dd89614fd843c
I am happy to hear your comments
credit : @soheilsec
https://gist.github.com/soheilsec/8310eea7913de6457f0dd89614fd843c
👍2🤔2
Source Byte
I am working on a #red_team course. There are 3 prerequisites. The course is based on mitre tactics and I'm working on the simulations on techniques labs/material. I am happy to hear your comments credit : @soheilsec https://gist.github.com/soheilsec/…
This media is not supported in your browser
VIEW IN TELEGRAM
Three parts series on debugging Linux kernel (gdb, kgdb, kgdboc and crash)
Part 1: blogs.oracle.com/linux/post/…
Part 2: blogs.oracle.com/linux/post/…
Part 3: blogs.oracle.com/linux/post/…
#linux , #kernel , #debug ,
Part 1: blogs.oracle.com/linux/post/…
Part 2: blogs.oracle.com/linux/post/…
Part 3: blogs.oracle.com/linux/post/…
#linux , #kernel , #debug ,
Collection of less known features of C programming language by @Jorengarenar
https://blog.joren.ga/less-known-c
https://blog.joren.ga/less-known-c
Game hacking allows you to add functionality and change how games work. Whether your goal is to add a new unit to an RTS game or create an aimbot for a FPS game, Game Hacking Academy has lessons to learn along with
https://gamehacking.academy/
https://gamehacking.academy/
gamehacking.academy
About · Game Hacking Academy
Game hacking tutorials and lessons.
😁1
collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net
Link
Link