You are on page 1of 1

ITS ALL ABOUT MEMORY & POINTERS,THOSE WHO CONTROL IT CONTROL EVERYTHING reverse engineering c c++ language python

language assembly language web design php--mysql

buffer overflows and stack overflows create DLLs and loading,unloading of Dlls using windows api to create a program and write advanced programs HOW A REMOTE EXPLOIT actually happens how to exploit a software if firewall is turned on default DLLs and default functions(meaning which are present in every version of windows) in DLLs token implementation and how to get impersonation token of system What are the priveleges got, if i create a process under a system process(meanin g access rights) vmock----

You might also like