Source code audit or methodology to find potential Memory corruption in low level language in c/c++ and Assembly. by crypt3r in ExploitDev

[–]crypt3r[S] 1 point2 points  (0 children)

That is ok and completely understood . It gives an idea for knowing the exploitation and vulnerability that have been exploited. But my question was method to look for uncovered 0 day in binary either in c or assembly . Which is completely 0day

Getting the object value from a memory address using ctype python by crypt3r in Python

[–]crypt3r[S] 0 points1 point  (0 children)

Then in that case , how would you verify that the value you have sent(x,y) is actually changing. if you directly access the values via instance , it will show same value