Tag
#wdk#File Fuzzing#peach fuzzer#zlib#arm gdb#stack buffer overflow#emet 4.1#shellcode#metasploit#EMET#Linux#git#code virtualizer 1.0.1.0#dex hooking#static 함수#kdress#mini-xml#xml c#System call#__usercall hooking#__usercall#base64 table scan#ollydbg plugin#공인인증서 개인키#visual studio linux#vs linux#static 변수#클라이언트 인증서#bonobo git#windows 2012 r2#와이어샤크 http패킷#http 패킷 분석#윈도우즈 우분투 멀티부팅#windows ubuntu dual boot#GE72-6QF#RSA1024 이하 미지원#minizip#RPC pipe#integrity low#call stack#콜스택#MD5 SOURCE#CRYPTO API#FILE MD5#veil framework#powershell payload#파워쉘#rsa to pem#visual studio so#vs-android#ndk-build visual studio#visual studio ndk#EMET 5.0#zip fuzzing#minifuzz#Fuzzing#파일 퍼징#android ssh server#code patching#arm elf 분석#안드로이드 gdb#안드로이드 gcc#BlazeDVD Pro Player#Memory Corruption#SEH Overwrite#internet explorer injector#dll injector#POS 해킹#UNICODE_STRING#ExAllocatePool#windows shellcode#MandatoryASLR#Deep Hooks#ring 3#segment descriptor#WINDOWS ROP#ROP CHAIN#ROP GADGET#CVE-2013-3346#퍼징#ROP#Use after free#쉘코드#ObOpenObjectByPointer#사설인증서#전처리기#Frida#powershell#ASLR#BOF#APMSETUP#Caller#MASM#unzip#process handle#Exploit#Hooking#RPC#openssl#ASR#SSL#후킹#해시##define#CUDA#encoding#POS#인코딩#ubuntu#base64#OllyDbg#드라이버#개발#nvidia#arm#XML#HASH