Hi Guys, There is a time where you found vulnerability on the server related to SQL injection and want to leverage the attack to get
by Rio Asmara Suryadi
Hi Guys, There is a time where you found vulnerability on the server related to SQL injection and want to leverage the attack to get
Hi All, After long journey in the reverse engineering world which requires Us to never stop learning. Today I am going to give you an
Hi Guys, I would like to share a tutorial on how to extract the shell code from a malware. This is very useful when you
Hi everytbody, I would like to continue my previous post regarding the buffer overflow, in this tutorial I want to share about how to calculte
Hi All, I would like to share a post related to buffer overflow, Why i pick this topic is because most critical vulnerability related to
Hi Everybody, Today I would like to share the basic of stack return address overwrite that become the fundamental of buffer overflow concept. In this