River

  • Home
  • Archive
  • Categories
  • Tags
  • Search
  • 2024

  • 2024-10-22
    Heap 1

    Writing and understanding a buffer overflow payloads

  • 2024-10-22
    Heap 2

    Utilizing a buffer overflow payloads to override pointers

  • 2024-10-22
    Heap 3

    Leveraging a UAF vulnerability to manipulate heap allocation

  • 2024-09-14
    Trickster

    Exploiting a site that only accepts PNG files

  • 2024-08-27
    Format String 1

    Easy format string vulnerability

  • 2024-08-27
    Format String 2

    Writing and understanding a format string payloads

  • 2024-08-21
    VNE

    Abusing environment variables

  • 2024-08-13
    JWT

    Exploiting JSON Web Tokens

  • 2024-08-13
    Sillygoose

    Exploiting a simple number search binary game

  • 2024-07-21
    The Breachforums Situation Explained

    The situation quickly summarized

Page 2 of 2
Copyright © 2024-2025 River
  • Home
  • Archive
  • Categories
  • Tags
  • Search