PWN101. Step-by-step tutorials on some binary exploitation stack-based techniques.
-
Updated
Oct 24, 2021
PWN101. Step-by-step tutorials on some binary exploitation stack-based techniques.
The fourth in a series of four machines, each pen-tested and explained.
The third in a series of four machines, each pen-tested and explained.
Static analysis tool for format string vulnerability detection
Cybersecurity fundamentals course logs and ctfs
My course work about basic binary exploitation.🤿
Форматирование строк (String formatting)
Formatting and printing string utilities
Miscellaneous utilities
camelCase, kebab-case, PascalCase... a simple integration with nano package size. (SMALL footprint!)
Add a description, image, and links to the format-string topic page so that developers can more easily learn about it.
To associate your repository with the format-string topic, visit your repo's landing page and select "manage topics."