Skip to content
View selfsigned's full-sized avatar
👺
Codin'
👺
Codin'

Highlights

  • Pro

Block or report selfsigned

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
selfsigned/README.md

Pinned Loading

  1. kfs kfs Public

    x86 bare metal programming for 42's Kernel programming track

    C 1

  2. Advent-of-Svelte-2023 Advent-of-Svelte-2023 Public

    Advent of Svelte 2023

    Svelte 1

  3. portfolio portfolio Public

    My web resume

    Svelte 1

  4. description of a ret2libc exploit in... description of a ret2libc exploit in the 42 rainfall project
    1
    ## Ret2libc
    2
    An alternative to using a shellcode is to find the adress of the `system()` function in memory and to complement it with a memory location that contains a shell path string.
    3
    This method has the advantage of also working when the NX bit is set (not the case here), NX being a technology that marks certain areas of memory as non-executable, supposedly foiling buffer overflow attacks.
    4
     
    5
    #### The exploit
  5. Functional FizzBuzz Functional FizzBuzz
    1
    // Logic
    2
    type FizzBuzzOutput = (x: number) => string
    3
    const Fizz : FizzBuzzOutput = x => (x % 3 === 0) ? "Fizz" : ""
    4
    const Buzz : FizzBuzzOutput = x => (x % 5 === 0) ? "Buzz" : ""
    5
    const FizzBuzzPrint : FizzBuzzOutput = x => Fizz(x) + Buzz(x)
  6. HackThePlanet HackThePlanet Public

    42 Cybersec projects

    C 3