I am currently learning about binary exploitation. Now i am working with a binary (Linux) that is vulnerable to a stack buffer overflow (ASLR and NX are enabled
etcdctl
stretchdibits
postgresql-8.3
ssrf
cmark
axiom
jest-dom
harp
android-flavors
device-owner
powershell-core
petastorm
apache-cayenne
google-artifact-registry
mmap
max-execution-timeout
cps
xauth
jsonobject
dwarf
setwindowshookex
gitops
cpu-hazard
xctestexpectation
dxf
game-center-leaderboard
midp-2.0
credentials
android-inapp-purchase
kaspersky