Shellcode

Results: 175



#Item
101Computer architecture / Mobile computers / Shellcode / Pocket PC / Windows Mobile / Personal digital assistant / Buffer overflow / ARM architecture / Interactive Disassembler / Computing / Windows CE / Software

Microsoft PowerPoint - shmoo2007_conference.ppt

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:44:38
102C Standard Library / Return-to-libc attack / Address space layout randomization / Buffer overflow / Software engineering / GADGET / MOV / Shellcode / NX bit / Computing / Software bugs / Computer architecture

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-12-17 15:18:11
103Computer errors / Software engineering / Buffer overflow / Shellcode / Return-to-libc attack / X86 assembly language / Stack / Segmentation fault / Stack buffer overflow / Computing / Software bugs / Software quality

ROP PRIMER BY @BARREBAS // CTF-TEAM.VULNHUB.COM CONTENTS

Add to Reading List

Source URL: speakerd.s3.amazonaws.com

Language: English - Date: 2015-03-04 17:01:47
104Computing / Main function / Shellcode / Hooking / Global variable / Software engineering / Secure Shell / Password

Index Note: Page numbers followed by f, n, or t indicate figures, notes, and tables respectively.

Add to Reading List

Source URL: www.nostarch.com

Language: English - Date: 2014-11-14 20:21:45
105Software bugs / Cross-platform software / Heap spraying / Shellcode / Buffer overflow / Address space layout randomization / NOP slide / JavaScript / Garbage collection / Computing / Cyberwarfare / Computer security

N OZZLE: A Defense Against Heap-spraying Code Injection Attacks Paruj Ratanaworabhan Cornell University Benjamin Livshits

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2009-06-05 22:26:35
106Computer file formats / Shellcode / Malware / DLL injection / Dynamic-link library / Portable Executable / Metasploit Project / Position-independent code / Library / Software / Computing / System software

 www.harmonysecurity.com  [removed] Reflective DLL Injection v1.0

Add to Reading List

Source URL: www.harmonysecurity.com

Language: English - Date: 2012-09-06 08:31:43
107Malware / Software bugs / Shellcode / Antivirus software / Buffer overflow / Computer virus / Code injection / Portable Executable / Hooking / Cyberwarfare / Computer security / Failure

WiShMaster Windows Shellcode Mastery BlackHat Europe[removed]Benjamin CAILLAT

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
108Computer security / Stack buffer overflow / Buffer overflow / Shellcode / Address space layout randomization / Stack / Pointer / PaX / Heap overflow / Software bugs / Computing / Software quality

\x90\x90\x90\x90\x90\x90\x90\x90 Stack Smashing as of Today A State-of-the-Art Overview on Buffer Overflow Protections

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
109Mac OS X / Mach / Address space layout randomization / Dynamic linker / Mach-O / Shellcode / Portable Executable / Library / Darwin / Software / Computing / Computer architecture

Fun and Games with Mac OS X and iPhone Payloads Charlie Miller Independent Security Evaluators [removed]

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:30
110Computing / Conficker / Shellcode / Svchost.exe / Malware / Dynamic-link library / SHA-1 / System software / Software / Computer worms

T H E H O N E Y N E T P R O J E C T ® | KYE Paper Know Your Enemy: Containing Conficker To Tame A Malware The Honeynet Project http://honeynet.org

Add to Reading List

Source URL: www.honeynet.org

Language: English - Date: 2014-01-06 14:17:06
UPDATE