×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [saved return address]
Reversing & Malware Analysis Training Part 11 - Exploit Development [Advanced]
14.011 views
1 introduction
1.279 views
Introduction to Software Exploitation Corey K.. All materials is licensed under a Creative Commons Share Alike license
219 views
Fighting buffer overflows with Address Space Layout Randomization
340 views
Advanced Buffer Overflow Methods Itzik Kotler [
[email protected]
]
234 views
A survey of Buffer overflow exploitation on HTC touch mobile phone Advanced Defense Lab CSIE NCU Chih-Wen Ou
214 views
IEEE Security and Privacy , Vol 2, no.4, July 2004 . Presented by
28 views
Introduction to Software Exploitation
40 views