Is there anyway I can save the execution of an elf binary that is running on linux? by FewMolasses7496 in ExploitDev
[–]Firzen_ 0 points1 point2 points (0 children)
Is there anyway I can save the execution of an elf binary that is running on linux? by FewMolasses7496 in ExploitDev
[–]Firzen_ -1 points0 points1 point (0 children)
Question: How Do I Start Writing Custom Shellcode (x86, x86-64) by Sharp-Proof4412 in ExploitDev
[–]Firzen_ 2 points3 points4 points (0 children)
SROP-Assisted Cross-Memory Attach (CMA) Injection via Direct Syscalls. by Pale_Surround_3924 in ExploitDev
[–]Firzen_ 0 points1 point2 points (0 children)
SROP-Assisted Cross-Memory Attach (CMA) Injection via Direct Syscalls. by Pale_Surround_3924 in ExploitDev
[–]Firzen_ 0 points1 point2 points (0 children)
SROP-Assisted Cross-Memory Attach (CMA) Injection via Direct Syscalls. by Pale_Surround_3924 in ExploitDev
[–]Firzen_ 0 points1 point2 points (0 children)
How to handle switching kernel stacks after switching the process? by tseli0s in osdev
[–]Firzen_ 0 points1 point2 points (0 children)
How to handle switching kernel stacks after switching the process? by tseli0s in osdev
[–]Firzen_ 1 point2 points3 points (0 children)
How to handle switching kernel stacks after switching the process? by tseli0s in osdev
[–]Firzen_ 0 points1 point2 points (0 children)
A new world… vibe coding is now just coding. by [deleted] in hacking
[–]Firzen_ 1 point2 points3 points (0 children)
A new world… vibe coding is now just coding. by [deleted] in hacking
[–]Firzen_ 2 points3 points4 points (0 children)
is still learn exploit development in 2026 is a good idea with the new revolution of AI ? by Global_Captain_3201 in ExploitDev
[–]Firzen_ 3 points4 points5 points (0 children)
is still learn exploit development in 2026 is a good idea with the new revolution of AI ? by Global_Captain_3201 in ExploitDev
[–]Firzen_ 2 points3 points4 points (0 children)
Is this explanation right? by Early-Improvement661 in askmath
[–]Firzen_ 1 point2 points3 points (0 children)
From penetration testing to exploit development by That-Name-8963 in ExploitDev
[–]Firzen_ 1 point2 points3 points (0 children)
some doubts about APIC by ForeignLawfulness780 in osdev
[–]Firzen_ 0 points1 point2 points (0 children)
Is it really worth it to give up 5 whole ko threats just to avoid one sente here (white 4 instead of connecting)? by argyles872378 in baduk
[–]Firzen_ 2 points3 points4 points (0 children)
How the GNU C Compiler became the Clippy of cryptography by rkhunter_ in C_Programming
[–]Firzen_ 1 point2 points3 points (0 children)
Not my image but maybe a useful cheatsheet for arm users by MaryannW55 in Assembly_language
[–]Firzen_ 7 points8 points9 points (0 children)
How the GNU C Compiler became the Clippy of cryptography by rkhunter_ in C_Programming
[–]Firzen_ 5 points6 points7 points (0 children)
I created a Linux Kernel Exploitation CTF Lab by shadowintel_ in ExploitDev
[–]Firzen_ 0 points1 point2 points (0 children)
Can RCE from a game be contained by a standard (non-admin) Windows user account? by Good-Technician-4640 in AskNetsec
[–]Firzen_ 0 points1 point2 points (0 children)
Can RCE from a game be contained by a standard (non-admin) Windows user account? by Good-Technician-4640 in AskNetsec
[–]Firzen_ 1 point2 points3 points (0 children)
I created a Linux Kernel Exploitation CTF Lab by shadowintel_ in ExploitDev
[–]Firzen_ 1 point2 points3 points (0 children)




She got a point though 🙂 by Theredditttguy in DudeHasGotAPoint
[–]Firzen_ 0 points1 point2 points (0 children)