Dive into the world of binary exploitation with this comprehensive guide.
Whether you’re a beginner eager to understand stack techniques or looking to explore introductory heap exploits, this blog has everything you need.
Alongside detailed notes, you’ll find vulnerable binaries to practice your skills.
Join me, Andrej Ljubic, as we unravel the complexities of binary exploitation together.
Welcome to my blog! There’s a lot here and it’s a bit spread out, so here’s a guide:
GasMasK is a versatile open-source tool designed for extensive information gathering and OSINT (Open Source…
The purpose of this library is to be very fast and small. It's suitable for…
PDFMtEd (PDF Metadata Editor) is a set of tools designed to simplify working with PDF metadata on Linux.…
The FBI collects and publishes Uniform Crime Reporting (UCR) data on an annual basis. Over 18,000 law…
XM Goat is composed of XM Cyber terraform templates that help you learn about common…
A vulnerable application made using node.js, express server and ejs template engine. This application is…