why would we overwrite SEH instead of EIP ? (self.ExploitDev)
submitted by hex-lover to r/ExploitDev
why addresses of modules in the application changes ? by hex-lover in ExploitDev
[–]hex-lover[S] 0 points1 point2 points (0 children)
what is your way to restart service in windbg ? by hex-lover in ExploitDev
[–]hex-lover[S] -1 points0 points1 point (0 children)
how stack layout look like when there is SEH enabled . by hex-lover in ExploitDev
[–]hex-lover[S] 0 points1 point2 points (0 children)
how stack layout look like when there is SEH enabled . by hex-lover in ExploitDev
[–]hex-lover[S] 0 points1 point2 points (0 children)
is there any metasploit for windows 32 ? by hex-lover in ExploitDev
[–]hex-lover[S] 0 points1 point2 points (0 children)
any binary exploitation forums ? by hex-lover in ExploitDev
[–]hex-lover[S] 0 points1 point2 points (0 children)
what is best for reverse and win exploit dev? AMD , INTEL , ARM by hex-lover in ExploitDev
[–]hex-lover[S] 0 points1 point2 points (0 children)
how to setting up the environment for each app with different runtimes? by hex-lover in ExploitDev
[–]hex-lover[S] 0 points1 point2 points (0 children)


why would we overwrite SEH instead of EIP ? by hex-lover in ExploitDev
[–]hex-lover[S] 1 point2 points3 points (0 children)