SHCyberHow I Learned To Exploit Buffer Overflows: An Introduction to Stack-Based Buffer OverflowsLearn to exploit stack-based buffer overflows and how to examine memory with gdb.5 min read·Jan 28, 2024----
SHCyberFrom 0 to 0-Day — <Start [0]>Join me on my journey of learning how to find and exploit vulnerabilities in popular products and operating systems.1 min read·Jan 23, 2024----
SHCyberStealing private messages using XSS on subdomainHijacked websocket connection2 min read·Jan 2, 2024----