logo
Red wilds
Nefarious nudges and NOPs
  • Privacy greenhouse
  • Defence blues
  • Purple crossroads
  • Indigo observatory
  • Contact
Initializing search
    • Unseen University Power & Light Co.
    • The Scarlet Semaphore
    • Myrddin’s menagerie
    • In: Where the falcons and foxes roam
    • Through: Where the raccoons burrow and rummage
      • The art of staying where you are not wanted
      • Overflowing the bin on purpose
        • Nefarious nudges and NOPs
          • Importance of buffer overflows
          • Stack operations and function-calling
          • Linux x86 exploits
          • Modern memory corruption
        • Nefarious nudges and NOPs
          • Importance of buffer overflows
          • Stack operations and function-calling
          • Linux x86 exploits
          • Modern memory corruption
        • Virtual bins and real exploits (thm)
        • Rooting around (root-me) in memory
        • Runbooks
      • Reverse engineering
      • Steganography
      • Crypto-attacks
      • Slipping through the cracks
    • Out: Where squirrels swipe the crown jewels

    Nefarious nudges and NOPs¶

    This is the raccoon’s annotated field guide to overflow hunting: notes on vulnerability discovery, memory manipulation, and shell-spawning sorcery. Not quite bedtime reading, unless your dreams involve segfaults and root shells.

    Notes on techniques

    • Importance of buffer overflows
    • Stack operations and function-calling
    • Linux x86 exploits
    • Modern memory corruption
    2026-03-25 22:33
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7