call stack
2025-04-13
The call stack is a LIFO data structure used by a program to store information about active subroutines, including return addresses, local variables, ... Read More
CERT
2025-04-13
A CERT (Computer Emergency Response Team) is an organization of cybersecurity professionals responsible for detecting, analyzing, and responding to ... Read More
designandimplementationofuserlandexec-grugq2004
2025-04-13
The Design and Implementation of Userland Exec by the grugq 2004 (https://news.ycombinator.com/item?id=37025843) ... Read More
dividing by zero
2025-04-13
In mathematics and computer science, dividing by zero is impossible. In computers, division by zero typically results in a trap and typically ... Read More
duke
2025-04-13
Mark Dowd (duke) is an Australian hacker, author, and entrepreneur known for The Art of Software Security Assessment and several exploits released ... Read More
EIP
2025-04-13
EIP and RIP are the instruction pointer registers for x86 and x86_64 processors, respectively. Read More
envp
2025-04-13
envp is an array of strings passed to main() that holds a process’s environment variables. Read More
function calls
2025-04-13
Read More
global variable
2025-04-13
A global variable is a variable declared outside of a function that is typically accessible from anywhere within the same source file or multiple ... Read More
IDA pro
2025-04-13
IDA Pro (Interactive Disassembler Professional) is a disassembler and debugger used for reverse engineering, developed by Hex-Rays. ... Read More