🎭 Ah, yes! Nothing screams 'fun' like diving into the riveting world of ELF executable formats—surely the life of the party! 📚💥 Because who wouldn't want to spend their weekend getting cozy with #PTINTERP segments and dynamic linker loaders? 🙃🎉
https://nytpu.com/gemlog/2025-12-21 #ELFformats #dynamiclinker #techfun #codingadventures #HackerNews #ngated
ELF Crimes: Program Interpreter Fun

nytpu.com
How to unload a LD_PRELOAD library the hard way

<p>Some days ago in the 0x00sec discord channel, somebody asked how to remove a library from memory. That person was trying to inject some code in a program using <code>LD_PRELOAD</code> to get some code executed automatically, however, after doing its stuff the library stayed in memory even after deleting the file in the disk. In other words, it was still visible in <code>/proc/PID/maps</code>.</p>

DMO Blog Tempus Fugit