LauraWartschinski / overflow_with_joyLinks
buffer overflow exploits for simple c programs (64 bit)
☆15Updated 5 years ago
Alternatives and similar repositories for overflow_with_joy
Users that are interested in overflow_with_joy are comparing it to the libraries listed below
Sorting:
- Some guides about general topics on information security☆13Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Read only mirror - No pull requests☆19Updated 4 years ago
- Red-team tool to hook libc read syscall with a buffer overflow vulnerability.☆36Updated 6 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- A WASM CTF Challenge☆18Updated 6 years ago
- A collection of software bug types and articles showcasing the hunt for and exploitation of them.☆20Updated 4 years ago
- Diary of a reverse-engineer blog☆20Updated last year
- Automatically exported from code.google.com/p/narly☆24Updated 3 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆93Updated 7 years ago
- Assembly language files and Shellcode☆34Updated 3 years ago
- Disassembly Generation and Processing for JARV1S☆14Updated 3 weeks ago
- Stego Helper Identification Tool☆27Updated 6 years ago
- My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!☆21Updated 4 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Updated 4 years ago
- yara and radare2, better together☆25Updated last month
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆129Updated 7 years ago
- A set of Python tools useful for cryptography and cryptanalysis.☆15Updated 8 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆73Updated 4 years ago
- Binary exploitation exercises and scripts☆10Updated 3 years ago
- ☆37Updated 4 years ago
- Embedded AppSec Best Practices☆41Updated last year
- Binary Golf Library☆62Updated 4 years ago
- The Dumb Network Fuzzer☆20Updated last year
- PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610☆77Updated 5 years ago
- Protocol Reverse Engineering Resources☆23Updated 2 years ago
- Source files and writeups for UTCTF 2019☆14Updated 4 years ago
- HTTP Desync Attack☆28Updated 5 years ago
- Lazily wraps various Linux system auditing tools☆17Updated last year