Skip to content
View selfsigned's full-sized avatar
๐Ÿ‘บ
Codin'
๐Ÿ‘บ
Codin'

Highlights

  • Pro
Block or Report

Block or report selfsigned

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
selfsigned/README.md

Pinned

  1. kfs kfs Public

    x86 bare metal programming for 42's Kernel programming track

    C 2

  2. Advent-of-Svelte-2023 Advent-of-Svelte-2023 Public

    Advent of Svelte 2023

    Svelte 1

  3. selfsigned.github.io selfsigned.github.io Public

    My web resume

    Svelte 1

  4. description of a ret2libc exploit in... description of a ret2libc exploit in the 42 rainfall project
    1
    ## Ret2libc
    2
    An alternative to using a shellcode is to find the adress of the `system()` function in memory and to complement it with a memory location that contains a shell path string.
    3
    This method has the advantage of also working when the NX bit is set (not the case here), NX being a technology that marks certain areas of memory as non-executable, supposedly foiling buffer overflow attacks.
    4
    
                  
    5
    #### The exploit
  5. Functional FizzBuzz Functional FizzBuzz
    1
    // Logic
    2
    type FizzBuzzOutput = (x: number) => string
    3
    const Fizz : FizzBuzzOutput = x => (x % 3 === 0) ? "Fizz" : ""
    4
    const Buzz : FizzBuzzOutput = x => (x % 5 === 0) ? "Buzz" : ""
    5
    const FizzBuzzPrint : FizzBuzzOutput = x => Fizz(x) + Buzz(x)
  6. HackThePlanet HackThePlanet Public

    42 Cybersec projects

    C 2