-
🌱 I’m currently learning Cybersecurity
-
👯 I’m looking to collaborate on CTFs
-
👨💻 All of my projects are available at https://github.com/ali0gamer1
-
📫 How to reach me gta7iv7@gmail.com
-
⚡ Fun fact I have no idea what I am doing
Pinned Loading
-
-
data transfer through memory-mapped ...
data transfer through memory-mapped file. 1//link: https://stackoverflow.com/questions/22047673/transferring-data-through-a-memory-mapped-file-using-win32-winapi
2//First process (sends the data):
3#include <windows.h>
4#include <stdio.h>
5#include <conio.h>
-
pneumatic validator solution hackthebox
pneumatic validator solution hackthebox 1from string import ascii_letters, digits
2from subprocess import run, PIPE
3from threading import Thread
45pasw = "HTB{"
-
-
CSAW Quals'17 SVC exploit (my own libc)
CSAW Quals'17 SVC exploit (my own libc) 1from pwn import *
23target = process("./svc")
45 -
google ctf beginner reversing (no sat)
google ctf beginner reversing (no sat) 1"""
2ATTENTION: run in gdb using: "gdb ./beginner" and then write: "source lolme.py"
34"""
5import gdb
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.