Ahmed Hesham
CyberSec/InfoSec enthusiast.
Interested in knowing how things work/Interested in breaking them, always learning.

  Ad

binary-exploitation

  - Articles about basic binary exploitation techniques.

Buffer Overflow Examples, Bypassing non-executable stack by re2libc - protostar stack6

      - Published on: Mar 20, 2019

Buffer Overflow Examples, Code execution by shellcode injection - protostar stack5

      - Published on: Jan 17, 2019

Buffer Overflow Examples, Taking control of the instruction pointer - protostar stack4

      - Published on: Jan 14, 2019

Buffer Overflow Examples, Overwriting a function pointer - protostar stack3

      - Published on: Jan 8, 2019

Buffer Overflow Examples, Overwriting a variable value on the stack - Protostar Stack1 , Stack2

      - Published on: Dec 30, 2018

Binary Exploitation - Buffer Overflow Explained in Detail

      - Published on: Dec 19, 2018