MaGe Linux Operations
MaGe Linux Operations
Nov 29, 2018 · Information Security

Master Python for Exploit Development: Setup, Libraries, and Network Tricks

This guide walks you through configuring a Python environment, installing essential packages such as virtualenv, IPython, requests, BeautifulSoup, and pwntools, and demonstrates how to perform network communication, binary manipulation, encoding, and C library integration, empowering you to develop security exploits efficiently.

Binaryexploit developmentpwntools
0 likes · 9 min read
Master Python for Exploit Development: Setup, Libraries, and Network Tricks
ITPUB
ITPUB
Nov 1, 2016 · Information Security

How Linux Buffer Overflows Work and How to Defend Against Them

This article explains the mechanics of Linux buffer‑overflow attacks with concrete C and assembly examples, shows how to craft and execute shellcode, and demonstrates practical mitigation techniques such as using Libsafe with LD_PRELOAD to protect vulnerable programs.

LD_PRELOADLibsafeLinux Security
0 likes · 23 min read
How Linux Buffer Overflows Work and How to Defend Against Them