q7rAuPaME

66c95473ba135f8640c3ad65f93d147e09edbf21be78a559553e1af72aa7b25a

Analysis SignalStatusDetails
No eXecuteEnabledNX (No eXecute) indicates that the binary has a non-executable stack/heap (i.e., Data Execution Prevention). This prevents code from running in data sections of the process.
Position Independent ExecutablePIEPosition Independent Executable (PIE) indicates that the binary is compiled with position-independent code, allowing it to be loaded at any address in memory.
Read-Only RelocationsPartialRead-Only Relocations indicate that the binary has read-only relocations, preventing modification of certain sections at runtime.
Stack CanaryDisabledStack Canary indicates that the binary uses stack canaries to detect stack buffer overflows and prevent exploitation.
FORTIFY0 / 4Refers to the _FORTIFY_SOURCE feature. “Partial” means some functions (like memcpy, strcpy, etc.) are protected by FORTIFY, but not all possible ones.
Clang CFIDisabledThese fields being “false” simply mean the binary was not compiled with Clang’s Control Flow Integrity (CFI) or SafeStack support.
Clang SafeStackDisabledThese fields being “false” simply mean the binary was not compiled with Clang’s Control Flow Integrity (CFI) or SafeStack support.
Stack Clash ProtectionDisabledStack Clash Protection indicates that the binary has protections against stack clash attacks, which exploit stack memory layout.