Ahmed Hesham
CyberSec/InfoSec enthusiast.
Interested in knowing how things work/Interested in breaking them, always learning.

  Ad

Recent Articles

Buffer Overflow Examples, Overwriting a function pointer - protostar stack3


Buffer Overflow Examples, Overwriting a variable value on the stack - Protostar Stack1 , Stack2


Binary Exploitation - Buffer Overflow Explained in Detail


Hack The Box - Waldo


All Tags

Categories

hack-the-box

binary-exploitation

wizard-labs

lists

pwn

ctfs