From 9b75f0de94978a681682cf13d392b0db7fa4161a Mon Sep 17 00:00:00 2001 From: Your Name <you@example.com> Date: Thu, 17 Feb 2022 16:09:17 +0000 Subject: [PATCH] Cool new Implementation --- js/src/gc/Nursery.cpp | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/js/src/gc/Nursery.cpp b/js/src/gc/Nursery.cpp
6/23/2022Learning Points: Fuzz it a little... +0 +10000000 +++++ 1+1*1-1 ...
8/16/2021Baby-sum pwn challenge from IJCTF 2021. The author for the challenge is @whoamiT and it is solved by @thonk. Sample running of binary Take note of the red underline. The binary first takes in a name input and subsequent 3 number input. Vulnerability There are 3 main vulnerabilities:
7/28/2021One of the OSED student has kindly write some vulnerable server for us to practice. Below is the link and release version: https://github.com/bmdyy/signatus First deobfuscation This seems like some obfuscation but actually edi still ends up as the same value you send in little endian. Second deobfuscation .text:60AE1397 01C or edi, eax ; edi still looks like the original packet
6/18/2021or
By clicking below, you agree to our terms of service.
New to HackMD? Sign up