From c4dad0a4bff3f5efdfdaee4311b7c5f35d7f07ad Mon Sep 17 00:00:00 2001 From: pe3zx Date: Thu, 29 Mar 2018 21:20:49 +0700 Subject: [PATCH] [Articles][Exploitation] Stack Based Buffer Overflows on x64 (Windows) --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 1fed4b4..e63da77 100644 --- a/README.md +++ b/README.md @@ -324,6 +324,7 @@ My curated list of awesome links, resources and tools - [Exploiting 1-byte buffer overflows](https://www.welivesecurity.com/2016/05/10/exploiting-1-byte-buffer-overflows/) - [PLAYING WITH CANARIES](https://www.elttam.com.au/blog/playing-with-canaries/) - [Simple buffer overflow on a modern system](http://liveoverflow.com/blog/stack0_buffer_overflow_on_ubuntu.html) +- [Stack Based Buffer Overflows on x64 (Windows)](Stack Based Buffer Overflows on x64 (Windows)) - [Stack Clashing for Fun and Profit](http://nullprogram.com/blog/2017/06/21/) - [When is something overflowing](https://www.slideshare.net/PeterHlavaty/overflow-48573748) - [X86 EXPLOITATION 101: WHEN THE STACK GETS OVER ITS HEAD](https://gbmaster.wordpress.com/2014/06/18/x86-exploitation-101-when-the-stack-gets-over-its-head/)