PwnSec Notes
search
Ctrlk
  • AppSecchevron-right
  • Forensicschevron-right
  • Binary-Exploitationchevron-right
    • Concepts
    • Binary Analysis
    • Debugging
    • Shellcodes
  • Malware-Analysischevron-right
  • Reverse-Engineeringchevron-right
  • Services
    • SNMP
    • Grafana
    • Consul
  • Network Pentesting
    • C2 Servers
    • Pivoting
    • CrackMapExec
    • Kubernetes
    • Docker
  • MISCchevron-right
  • Cloud Hackingchevron-right
  • Mobile Pentestingchevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Binary-Exploitation

Concepts

hashtag
Exploting Union

  • https://dev-discuss.pytorch.org/t/unionizing-for-profit-how-to-exploit-the-power-of-unions-in-c/444arrow-up-right

PreviousBinary-Exploitationchevron-leftNextBinary Analysischevron-right

Last updated 3 years ago