Codetronik

  • 전체 (119)
    • whoami (0)
    • Language (3)
      • C++ (3)
    • Windows (49)
      • Dev (17)
      • Kernel Driver (9)
      • Hacking & Vulnerability (14)
      • Reversing (2)
    • Android Linux (26)
      • Kernel (2)
      • Rooting (4)
      • Hooking & Injection (4)
    • Linux (2)
      • Dev (2)
    • iOS (3)
      • frida (1)
    • WebApplication (0)
    • CTF Game Write-up (0)
    • CVE list (0)
    • etc (4)
    • Applied Cryptography (9)
    • fuzzing (0)
    • OP-TEE (5)
    • devSecOps (3)
    • mv (0)
  • 홈
  • 태그
  • 미디어로그
  • 위치로그
  • 방명록
/ /

Tag

#wdk#File Fuzzing#peach fuzzer#arm gdb#stack buffer overflow#emet 4.1#shellcode#metasploit#EMET#Linux#git#code virtualizer 1.0.1.0#dex hooking#static 함수#System call#__usercall hooking#__usercall#base64 table scan#ollydbg plugin#공인인증서 개인키#visual studio linux#vs linux#static 변수#클라이언트 인증서#와이어샤크 http패킷#http 패킷 분석#GE72-6QF#RSA1024 이하 미지원#RPC pipe#integrity low#call stack#콜스택#MD5 SOURCE#CRYPTO API#FILE MD5#veil framework#powershell payload#파워쉘#rsa to pem#visual studio so#vs-android#ndk-build visual studio#visual studio ndk#EMET 5.0#zip fuzzing#minifuzz#Fuzzing#파일 퍼징#zlib#android ssh server#code patching#arm elf 분석#안드로이드 gdb#안드로이드 gcc#BlazeDVD Pro Player#Memory Corruption#SEH Overwrite#internet explorer injector#dll injector#POS 해킹#UNICODE_STRING#ExAllocatePool#windows shellcode#MandatoryASLR#Deep Hooks#ring 3#segment descriptor#WINDOWS ROP#ROP CHAIN#ROP GADGET#CVE-2013-3346#퍼징#ROP#Use after free#쉘코드#ObOpenObjectByPointer#사설인증서#전처리기#Frida#powershell#ASLR#BOF#APMSETUP#Caller#MASM#process handle#Exploit#Hooking#RPC#openssl#ASR#SSL#후킹#해시##define#CUDA#encoding#POS#인코딩#ubuntu#base64#OllyDbg#드라이버#개발#nvidia#arm#HASH

+ Recent posts

Powered by Tistory, Designed by wallel
Rss Feed and Twitter, Facebook, Youtube, Google+

티스토리툴바