buffer overflow exploits for simple c programs (64 bit)
☆17Feb 10, 2020Updated 6 years ago
Alternatives and similar repositories for overflow_with_joy
Users that are interested in overflow_with_joy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Basic role to setup Debian as a server☆11Aug 25, 2022Updated 3 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- phpldapadmin remote exploit and vulnerable container !☆13Nov 9, 2018Updated 7 years ago
- ☆12Apr 22, 2023Updated 2 years ago
- Spectre exploit☆53Jan 9, 2018Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- MapTune: Advancing ASIC Technology Mapping via Reinforcement Learning Guided Library Tuning Mingju Liu, Daniel Robinson, Yingjie Li, Cunx…☆26Apr 9, 2025Updated last year
- Buffer Overflow Exploitation Examples☆48May 17, 2018Updated 7 years ago
- Cryptanalysis on differents algorithms with z3 solver sat☆18Aug 5, 2024Updated last year
- This repository contains binaries for the multiple teacher approach to learning differential private ML models: https://arxiv.org/abs/161…☆10Nov 16, 2016Updated 9 years ago
- News in Privacy-Preserving Machine Learning☆12Feb 5, 2020Updated 6 years ago
- First practical showcase for leaking secret encryption keys from a secure SGX enclave.☆20Mar 21, 2017Updated 9 years ago
- how to build up Knowledge graph☆12Nov 16, 2021Updated 4 years ago
- A C vector library similar to the C++ STL vector☆23Apr 20, 2025Updated 11 months ago
- A quick PoC to try out the "meltdown" timing attack.☆152Jan 6, 2018Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- [ICML 2024] Visual-Text Cross Alignment: Refining the Similarity Score in Vision-Language Models☆19Mar 23, 2026Updated 3 weeks ago
- MINIX v3.1.0 - described in the book 'Operating Systems Design and Implementation' 3rd edition.☆19Jun 1, 2016Updated 9 years ago
- An implementation of Judy Arrays in 1250 Lines of C Code. (with sample CLI applications and Xcode project)☆17Jun 23, 2011Updated 14 years ago
- Rage Against The Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks☆23Jun 11, 2021Updated 4 years ago
- Dynamic arbitrary typed array using fat pointers and macros.☆17Dec 1, 2016Updated 9 years ago
- HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators☆37Jan 14, 2022Updated 4 years ago
- Secure multi-party linear regression at plaintext speed☆17Mar 20, 2022Updated 4 years ago
- My course work about basic binary exploitation.🤿☆10Mar 16, 2022Updated 4 years ago
- Go Game Guru's Go Commentaries☆13May 20, 2016Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Manfred von Thun's Programming Language Joy☆18Mar 31, 2026Updated 2 weeks ago
- Memory allocation benchmark☆18Oct 29, 2022Updated 3 years ago
- An effort to transcribe Ken Iverson's "A Programming Language" book to LaTeX.☆18Aug 5, 2025Updated 8 months ago
- A faster analogue of the std::vector for the perfomance-dependent enviroment☆19Jun 21, 2019Updated 6 years ago
- A page containing many useful links.☆26Sep 6, 2024Updated last year
- Calcium OS project for x86_64☆41Oct 23, 2017Updated 8 years ago
- Text classification automl☆21Jul 18, 2021Updated 4 years ago
- Math expression evaluation as Linux kernel module☆17Apr 5, 2020Updated 6 years ago
- Open-source release of "Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud" (ASPLOS '24)☆34Feb 13, 2026Updated 2 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Lint for privacy☆29Sep 5, 2022Updated 3 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆41Dec 14, 2022Updated 3 years ago
- ☆44Jul 19, 2023Updated 2 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 6 years ago
- OpenSSH remote DOS exploit and vulnerable container☆53Oct 30, 2017Updated 8 years ago
- Blog dedicated to cryptography and machine learning☆23Nov 14, 2024Updated last year