Buffer Overflow - Part 02
A concise primer on stack-based buffer overflows covering exploitation techniques, common mitigations, and defensive best practices.
A concise primer on stack-based buffer overflows covering exploitation techniques, common mitigations, and defensive best practices.
How I found missing SRI using just curl and how it led to my first valid bug.
A Handy cheatsheet that you might require while writing some cool exploit scripts
Detailed blog on how to use the proxy configuration tool to stay anonymous
A Place to recall and revisit all the popular NMap commands
Deepdive into life of Aaron Swartz, the founder of reddit
A list of 60 most used linux commands for beginners
Exploring the rise of corporate-style cybercrime services on darknet and its implications for cybersecurity.
An overview of the Advanced Encryption Standard (AES) and its implementation across various platforms.
A comprehensive overview of the recent Discord data breach, its implications, and steps users can take to protect their information.