About allegiance
I initially got into programming when I was in 5th grade and wanted to learn how to make my own video games. From there, I learned to build computers in middle school and by the time I reached high school I was fascinated by the field of cyber security. As a Computer Science major in college, I am continuing to explore the realm of cyber security in the hopes of protecting people from the bad guys.
allegiance's Popular Posts
Exploit Development: How to Write Specific Values to Memory with Format String Exploitation
How To: Turn Any Phone into a Hacking Super Weapon with the Sonic
How To: Generate Private Encryption Keys with the Diffie-Hellman Key Exchange
Exploit Development: How to Manipulate Code Execution with the Instruction Pointer
Exploit Development: How to Learn Binary Exploitation with Protostar
How To: Take Control of the Mouse & Keyboard in Python
Advanced Exploitation: How to Find & Write a Buffer Overflow Exploit for a Network Service
Exploit Development: How to Defeat a Non-Executable Stack with ret2libc
Next Page
Prev Page
Sites
- Hot
- Latest
-
Advanced Exploitation: How to Find & Write a Buffer Overflow Exploit for a Network Service
-
Exploit Development: How to Defeat a Non-Executable Stack with ret2libc
-
Exploit Development: How to Write Specific Values to Memory with Format String Exploitation
-
Exploit Development: How to Read & Write to a Program's Memory Using a Format String Vulnerability
-
Exploit Development: How to Manipulate Code Execution with the Instruction Pointer
-
Exploit Development: How to Learn Binary Exploitation with Protostar
-
How To: Take Control of the Mouse & Keyboard in Python
-
How To: Turn Any Phone into a Hacking Super Weapon with the Sonic
-
How To: Generate Private Encryption Keys with the Diffie-Hellman Key Exchange
-
Exploit Development: How to Read & Write to a Program's Memory Using a Format String Vulnerability
-
Exploit Development: How to Write Specific Values to Memory with Format String Exploitation
-
How To: Turn Any Phone into a Hacking Super Weapon with the Sonic
-
How To: Generate Private Encryption Keys with the Diffie-Hellman Key Exchange
-
Exploit Development: How to Manipulate Code Execution with the Instruction Pointer
-
Exploit Development: How to Learn Binary Exploitation with Protostar
-
How To: Take Control of the Mouse & Keyboard in Python
-
Advanced Exploitation: How to Find & Write a Buffer Overflow Exploit for a Network Service
-
Exploit Development: How to Defeat a Non-Executable Stack with ret2libc