Tag: binary-code
Found 20 results for 'binary-code'.
1) opensource - Trust Issues Relative to Open Source
2) appsec - Storing private asymmetric key in application binary?
3) linux - Bash function manipulation explained
4) linux - Binary Exploitation - How to set GID of a SUID binary using shellcode?
5) exploit - How is a process forced to execute binary code?
6) appsec - How to inject executable, malicious code into PDF, JPEG, MP3, etc.?
7) exploit - What is the corrupted image vulnerability? How does it work?
8) exploit - How does binary code execution vulnerability work on a modern OS?
9) android - How to Check Compilation Options For SO File - Android Application VA
10) appsec - Code Analysis: Binary vs Source
11) opensource - Trust Issues Relative to Open Source
12) audit - auditing open source compiler binaries for trojans
13) attacks - ROP Attack :Force the program to manipulate an instruction as a gadget
14) malware - What does the NSA's Recently Leaked "The Equation Group" Files do?
15) encryption - Does the endianness used with an encryption algorithm affect its security?
16) encryption - Does a binary executable have to have some critical plain-text components?
17) binary-code - Is there any way to get a unicode character that has a byte of 23?
18) web-application - How to run client's code on server securely
19) source-code - Is there a way to verify a binary against the sources?
20) passwords - 256-bit Symmetric Keys As Passwords