angelboy peda
Linux Binary Exploitation Angelboy @ AIS3 2017 1; 2. About me • Angelboy • CTF player • WCTF / Boston Key Party 1st • DEFCON / HITB 2nd • Chroot / HITCON / 217 • Blog • blog.angelboy.tw 2; 3. Environment • Ubuntu 16.04 64 bit • binutils/nasm/ncat/gdb/pwn,GitHub is where people build software. More than 27 million people use GitHub to discover, fork, and contribute to over 80 million projects. ,Popular repositories. HITCON-Training. For Linux binary Exploitation. C 251 74 · Pwngdb. gdb for pwn. Python 245 59 · CTF. Some CTF write up. Python 101 23 · AIS3-2017. AIS3 2017 Binary Exploitation. Python 24 13 · peda. Forked
相關軟體 Write! 資訊 | |
---|---|
![]() angelboy peda 相關參考資料
Binary exploitation - AIS3 - SlideShare
Linux Binary Exploitation Angelboy @ AIS3 2017 1; 2. About me • Angelboy • CTF player • WCTF / Boston Key Party 1st • DEFCON / HITB 2nd • Chroot / HITCON / 217 • Blog • blog.angelboy.tw 2; 3. Environ... https://www.slideshare.net scwuaptx (Angelboy) Repositories · GitHub
GitHub is where people build software. More than 27 million people use GitHub to discover, fork, and contribute to over 80 million projects. https://github.com scwuaptx (Angelboy) · GitHub
Popular repositories. HITCON-Training. For Linux binary Exploitation. C 251 74 · Pwngdb. gdb for pwn. Python 245 59 · CTF. Some CTF write up. Python 101 23 · AIS3-2017. AIS3 2017 ... https://github.com |