Skip to main content

Function Pointer Hijack

Haunting the Heap: Use-After-Free in AuthenKey Login Handler (x64)
·620 words·3 mins
Reverse Engineering Diaries Use-After-Free Heap Exploitation X64 Reverse Engineering Function Pointer Hijack