SlideShare a Scribd company logo
  • Upload
  • Home
  • Explore
  • Login
  • Signup
SlideShare a Scribd company logo
  • Home
  • Explore
  • Upload
  • Login
  • Signup

We've updated our privacy policy. Click here to review the details. Tap here to review the details.

×
×
×
×
×
×
Angel Boy

Angel Boy

279 Followers
17 SlideShares 1 Clipboard 279 Followers 1 Following
  • Unblock User Block User
17 SlideShares 1 Clipboard 279 Followers 1 Following

Tags
exploit pwn ctf heap exploitation security glibc macos windows overflow memory corruption malloc heap exploitation osx tcache rop stack gdb asm binary memroy corruption file hitcon information security c++ vtable fastbin free chunk unlink
See more
Presentations (17)
See all
Return to dlresolve
7 years ago • 17389 Views
Sigreturn Oriented Programming
7 years ago • 25306 Views
Execution
7 years ago • 24637 Views
Heap exploitation
7 years ago • 33935 Views
Advanced heap exploitaion
7 years ago • 26049 Views
Pwning in c++ (basic)
6 years ago • 29128 Views
Binary exploitation - AIS3
5 years ago • 7169 Views
Play with FILE Structure - Yet Another Binary Exploit Technique
5 years ago • 36612 Views
Linux Binary Exploitation - Heap Exploitation
4 years ago • 1790 Views
Linux binary Exploitation - Basic knowledge
4 years ago • 2820 Views
Linux Binary Exploitation - Stack buffer overflow
4 years ago • 2572 Views
Linux Binary Exploitation - Return-oritend Programing
4 years ago • 2538 Views
Tcache Exploitation
4 years ago • 2789 Views
Windows 10 Nt Heap Exploitation (Chinese version)
3 years ago • 7506 Views
Windows 10 Nt Heap Exploitation (English version)
3 years ago • 42998 Views
MacOS memory allocator (libmalloc) Exploitation
3 years ago • 4192 Views
MacOS memory allocator (libmalloc) Exploitation - Chinese Version
3 years ago • 4440 Views
Likes (1)
ROP 輕鬆談
hackstuff • 8 years ago
  • Activity
  • About

Presentations (17)
See all
Return to dlresolve
7 years ago • 17389 Views
Sigreturn Oriented Programming
7 years ago • 25306 Views
Execution
7 years ago • 24637 Views
Heap exploitation
7 years ago • 33935 Views
Advanced heap exploitaion
7 years ago • 26049 Views
Pwning in c++ (basic)
6 years ago • 29128 Views
Binary exploitation - AIS3
5 years ago • 7169 Views
Play with FILE Structure - Yet Another Binary Exploit Technique
5 years ago • 36612 Views
Linux Binary Exploitation - Heap Exploitation
4 years ago • 1790 Views
Linux binary Exploitation - Basic knowledge
4 years ago • 2820 Views
Linux Binary Exploitation - Stack buffer overflow
4 years ago • 2572 Views
Linux Binary Exploitation - Return-oritend Programing
4 years ago • 2538 Views
Tcache Exploitation
4 years ago • 2789 Views
Windows 10 Nt Heap Exploitation (Chinese version)
3 years ago • 7506 Views
Windows 10 Nt Heap Exploitation (English version)
3 years ago • 42998 Views
MacOS memory allocator (libmalloc) Exploitation
3 years ago • 4192 Views
MacOS memory allocator (libmalloc) Exploitation - Chinese Version
3 years ago • 4440 Views
Likes (1)
ROP 輕鬆談
hackstuff • 8 years ago
Tags
exploit pwn ctf heap exploitation security glibc macos windows overflow memory corruption malloc heap exploitation osx tcache rop stack gdb asm binary memroy corruption file hitcon information security c++ vtable fastbin free chunk unlink
See more

Modal header

  • About
  • Support
  • Terms
  • Privacy
  • Copyright
  • Cookie Preferences
  • Do not sell or share my personal information
English
Current Language: English
Español
Português
Français
Deutsch

© 2023 SlideShare from Scribd

We've updated our privacy policy.

We’ve updated our privacy policy so that we are compliant with changing global privacy regulations and to provide you with insight into the limited ways in which we use your data.

You can read the details below. By accepting, you agree to the updated privacy policy.

Thank you!

View updated privacy policy
We've encountered a problem, please try again.