ALERT!
Click here to register with a few steps and explore all our cool stuff we have to offer!

Jump to content



Photo

[UDEMY] Linux Heap Exploitation - Part 2


  • Please log in to reply
[UDEMY] Linux Heap Exploitation - Part 2

#1

duysimple98
duysimple98
    Offline
    0
    Rep
    131
    Likes

    Advanced Member

  • PipPipPipPip
Posts: 82
Threads: 55
Joined: Dec 21, 2022
Credits: 0
One year registered
#1

3773360_65c6_2.jpg

 

What you'll learn:

  • The House of Spirit technique
  • The House of Lore technique
  • Leveraging single null byte overflows for code execution
  • The House of Einherjar technique
  • The Google Poison Null Byte technique
  • The House of Rabbit technique
  • Heap Feng Shui
  • The Tcache Dup technique

Last updated 8/2021

 

Link Course:

Please Login or Register to see this Hidden Content

 

 

Download Link: 

Hidden Content
You'll be able to see the hidden content once you reply to this topic or

Please Login or Register to see this Hidden Content

.


Edited by duysimple98, 01 February 2023 - 05:00 PM.

This leak has not been classified yet. Please be careful when downloading.
  • 0

#2

sovabebac96
sovabebac96
    Offline
    0
    Rep
    4
    Likes

    Advanced Member

Posts: 136
Threads: 0
Joined: Nov 01, 2022
Credits: 0

One year registered
#2
Thanks bro

  • 0


 Users browsing this thread: