Browser exploitation research presented by Jameel Nabbo in SEC-T Stockholm 2019
Today, we are going to explore a new vulnerability called “Type Confusion” and as the name indicates this is a logical bug which results fromRead More
Introduction: Basically, UAF happens when the program tries to access a portion of memory after it has been freed that may force the program toRead More
What is Format String ? if you wrote a C code before I guarantee that you’ve seen printf() function which writes a formatted string toRead More
Writeup for BoF of VUPlayer 2.49.
Greetings, I wanted to make a series of tutorials about Binary Exploitation but i wanted it to be different from most of the existing contentRead More
Introduction ROP or “Return-oriented programming” is an exploitation technique that allows an attacker to execute code in the presence of security defenses such as executableRead More