After having few years of security experience, I realized I am unable to work full-time on areas which excite me!! Hence I am currently working independently, focusing on exploit development and network security. Using this blog, I would love to share stuffs which amuses me!!
“Happiness is only real when shared” – Into the wild
My Best wishes!
LikeLiked by 1 person
Thanks machi!!
LikeLike
Nice Blog.
keep sharing.
LikeLike
Keep Going 🙂
LikeLike
I’m closely following your blog and learning a lot. I wish you good luck on your work, especially about heap issues. Thank you.
Yılmaz (www.cybersphinx.com)
LikeLiked by 1 person
Thanks for the wishes!! Yup tryin to get a firm hold on heap stuffs 🙂 Good to see your work too!!
LikeLike
Excellent Buddy.. Great Going…
LikeLiked by 1 person
Thanks Man!!
LikeLike
NICE WORK….
LikeLiked by 1 person
Thanks Buddy!!
LikeLike
Thank you very much!!!!!
LikeLiked by 1 person
Welcome!!
LikeLike
Hi,I wonder whether ROP can be applied to heap-based vulnerabilities since ROP can bypass NX.
LikeLiked by 1 person
Yup correct it can be, I didnt use it in my heap tuts since I just want to keep it simple!!
LikeLike
Gr8 Tutorial. eagerly waiting to c more tutorials (shellcoding,egghunting,ROP etc)
Thanks a lot for this tutorial.
LikeLiked by 1 person
thx! this blog helps me a lot.
LikeLiked by 1 person
Thank you very much, I learn a lot from you blog!
LikeLiked by 1 person
Nice Work!!!!
LikeLiked by 1 person
i have injected shellcode in a buffer vulnerable program but inspite everything being correctly done ,shellcode is not executing
i have read somewhere that syscalls are not allowoed through stack in 64 bit ..is it true?
if yes , then plz tell me a solution….
Will eagerly waiting for your response….
LikeLike
Thank you for your tutorial! Awesome work,i will read all as soon as possible 😀
LikeLike
Oh man ! You are a f4ck1ng LEGEND.
LikeLike
nice job, man
LikeLike
so sad for you stopped writing.
LikeLike