Ischyr's blog

Tags · Pwn

Home

About

Archives

loading..
Pwn

ret2libc

Binary Exploitation SeriesIntroductionWelcome to the fascinating world of binary exploitation, where we delve into the intricate art of manipulating computer programs to gain unauthorized access, uncover vulnerabilities, and expand our understanding of software security. In this blog post, we’ll embark on a journey into the technique known as “return to ..

Read more
loading..
Pwn

ret2win

Binary Exploitation SeriesIntroductionBinary exploitation is a field within computer security that involves finding and exploiting vulnerabilities in binary code, such as executable files or software applications. This practice, often performed by ethical hackers or security researchers, aims to uncover weaknesses that can be leveraged to gain unauthoriz..

Read more