call stack

2025-04-13

The call stack is a LIFO data structure used by a program to store information about active subroutines, including return addresses, local variables, ... Read More

CERT

2025-04-13

A CERT (Computer Emergency Response Team) is an organization of cybersecurity professionals responsible for detecting, analyzing, and responding to ... Read More

designandimplementationofuserlandexec-grugq2004

2025-04-13

The Design and Implementation of Userland Exec by the grugq 2004 (https://news.ycombinator.com/item?id=37025843) ... Read More

dividing by zero

2025-04-13

In mathematics and computer science, dividing by zero is impossible. In computers, division by zero typically results in a trap and typically ... Read More

duke

2025-04-13

Mark Dowd (duke) is an Australian hacker, author, and entrepreneur known for The Art of Software Security Assessment and several exploits released ... Read More

EIP

2025-04-13

EIP and RIP are the instruction pointer registers for x86 and x86_64 processors, respectively. Read More

envp

2025-04-13

envp is an array of strings passed to main() that holds a process’s environment variables. Read More

function calls

2025-04-13

Read More

global variable

2025-04-13

A global variable is a variable declared outside of a function that is typically accessible from anywhere within the same source file or multiple ... Read More

IDA pro

2025-04-13

IDA Pro (Interactive Disassembler Professional) is a disassembler and debugger used for reverse engineering, developed by Hex-Rays. ... Read More