• Hot Patching C/C++ Functions with Intel Pin

    Hot Patching C/C++ Functions with Intel Pin

    5 years ago, I said in one of my articles that I shall return, one day, with a method of hot patching functions inside live processes; So… I guess this is that day. What we’ll try to achieve here is...


  • Bypassing ASLR and DEP - Getting Shells with pwntools

    Bypassing ASLR and DEP - Getting Shells with pwntools

    Today, I’d like to take some time and to present a short trick to bypass both ASLR (Address Space Layout Randomization) and DEP (Data Execution Prevention) in order to obtain a shell in a buffer-overflow vulnerable binary. I’ve seen this...