Notebook of nefarious nudges and NOPs

This is the raccoon’s annotated field guide to overflow hunting: notes on vulnerability discovery, memory manipulation, and shell-spawning sorcery. Not quite bedtime reading—unless your dreams involve segfaults and root shells.


Last update: 2025-05-12 14:16