hackershelter.us
  • Home
  • Categories
  • Tags
  • Home
  • Categories
  • Tags
  • Top of Page

hackershelter.us

I often find myself lost deep in the woods of a variety of topics and need a place to keep track of it all. This is that place. Welcome, and enjoy! <3

Categories

  • Security 3
  • Reverse engineering 2

Posts in Security

  • Strategies for Binary Exploitation Part 2 (Use-After-Free) - April 21, 2017
  • Strategies for Binary Exploitation Part 1 (Memory Corruption) - April 20, 2017
  • Introduction to Reflective DLL Injection - November 14, 2016

Posts in Reverse engineering

  • Strategies for Binary Exploitation Part 2 (Use-After-Free) - April 21, 2017
  • Strategies for Binary Exploitation Part 1 (Memory Corruption) - April 20, 2017

© 2019 Jon Myers with Jekyll and dbyll