Shellcode

Results: 175



#Item
101Microsoft PowerPoint - shmoo2007_conference.ppt

Microsoft PowerPoint - shmoo2007_conference.ppt

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:44:38
102Q: Exploit Hardening Made Easy  Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-12-17 15:18:11
103ROP PRIMER BY @BARREBAS // CTF-TEAM.VULNHUB.COM  CONTENTS

ROP PRIMER BY @BARREBAS // CTF-TEAM.VULNHUB.COM CONTENTS

Add to Reading List

Source URL: speakerd.s3.amazonaws.com

Language: English - Date: 2015-03-04 17:01:47
104Index  Note: Page numbers followed by f, n, or t indicate figures, notes, and tables respectively.

Index Note: Page numbers followed by f, n, or t indicate figures, notes, and tables respectively.

Add to Reading List

Source URL: www.nostarch.com

Language: English - Date: 2014-11-14 20:21:45
105N OZZLE: A Defense Against Heap-spraying Code Injection Attacks Paruj Ratanaworabhan Cornell University  Benjamin Livshits

N OZZLE: A Defense Against Heap-spraying Code Injection Attacks Paruj Ratanaworabhan Cornell University Benjamin Livshits

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2009-06-05 22:26:35
106 www.harmonysecurity.com  [removed] Reflective DLL Injection v1.0

 www.harmonysecurity.com  [removed] Reflective DLL Injection v1.0

Add to Reading List

Source URL: www.harmonysecurity.com

Language: English - Date: 2012-09-06 08:31:43
107WiShMaster  Windows Shellcode Mastery BlackHat Europe[removed]Benjamin CAILLAT

WiShMaster Windows Shellcode Mastery BlackHat Europe[removed]Benjamin CAILLAT

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
108\x90\x90\x90\x90\x90\x90\x90\x90  Stack Smashing as of Today A State-of-the-Art Overview on Buffer Overflow Protections

\x90\x90\x90\x90\x90\x90\x90\x90 Stack Smashing as of Today A State-of-the-Art Overview on Buffer Overflow Protections

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
109Fun and Games with Mac OS X and iPhone Payloads Charlie Miller Independent Security Evaluators [removed]

Fun and Games with Mac OS X and iPhone Payloads Charlie Miller Independent Security Evaluators [removed]

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:30
110T H E H O N E Y N E T P R O J E C T ® | KYE Paper  Know Your Enemy: Containing Conficker To Tame A Malware The Honeynet Project http://honeynet.org

T H E H O N E Y N E T P R O J E C T ® | KYE Paper Know Your Enemy: Containing Conficker To Tame A Malware The Honeynet Project http://honeynet.org

Add to Reading List

Source URL: www.honeynet.org

Language: English - Date: 2014-01-06 14:17:06