Performing Buffer Overflow attack using stack smashing approach to obtain the shell. Given a C compiled vulnerable software, with the help of reverse engineering and debugging the attack had to be conducted to obtain the shell.
☆17Oct 12, 2021Updated 4 years ago
Alternatives and similar repositories for Buffer-Overflow-Attack-Adventure
Users that are interested in Buffer-Overflow-Attack-Adventure are comparing it to the libraries listed below
Sorting:
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Mar 8, 2019Updated 6 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Aug 18, 2020Updated 5 years ago
- FindCrypt for Ghidra written in Python☆26May 20, 2020Updated 5 years ago
- ☆28Apr 3, 2018Updated 7 years ago
- EN.650.624 Network Security☆29Feb 23, 2026Updated last week
- x64dbg Dark Theme - Own use☆31Apr 4, 2019Updated 6 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- ☆10Mar 8, 2024Updated last year
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Jun 4, 2019Updated 6 years ago
- A set of small utilities, helpers for PIN tracers☆37Feb 15, 2026Updated 2 weeks ago
- C++ Wrapper Library for WinAPI, Direct2D, GUIs and often used functionality. Quick and easy to use.☆10Oct 7, 2022Updated 3 years ago
- updated version of autoplay without third party authentication☆10Dec 4, 2020Updated 5 years ago
- A collection of documentation for different Docker topics☆10Oct 16, 2017Updated 8 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- Visually analyze basic block code coverage in Binary Ninja using Pin output.☆11Oct 6, 2017Updated 8 years ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- Collection of mods for Total War: Warhammer III☆13Aug 25, 2022Updated 3 years ago
- Low-level HTTP/2 client implementation for experimenting with the protocol.☆11Jul 26, 2020Updated 5 years ago
- WoW client modification to record client and server packets☆12Jan 7, 2016Updated 10 years ago
- Python utility to export a user's starred repositories list into a CSV file☆17May 3, 2018Updated 7 years ago
- A PE32/PE32+ parser written in MASM32☆13Feb 24, 2016Updated 10 years ago
- A full port of diablo for the switch with all of the necessary files included.☆10Jun 17, 2021Updated 4 years ago
- A memctl core for jailbroken iOS devices.☆11May 14, 2018Updated 7 years ago
- Windows library for hooking functions across processes, injecting DLLs into other applications, and more. (Somewhat similar to MS Detours…☆12Apr 2, 2013Updated 12 years ago
- Function ID for Malware Analysis☆13Jul 6, 2020Updated 5 years ago
- Learn Python with tests☆11Sep 4, 2021Updated 4 years ago
- Angecryption PoC☆12Mar 27, 2014Updated 11 years ago
- Packet library for Minecraft Beta 1.6.6 -> Release 1.4.1☆13Feb 10, 2025Updated last year
- Bot playing the Google Chrome dino game using OpenCV & C++☆12Dec 5, 2018Updated 7 years ago
- Today Plugin (x64) - A Plugin For x64dbg☆13Jul 17, 2018Updated 7 years ago
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- Generate Ghidra class structures☆12Jan 3, 2020Updated 6 years ago
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 14 years ago
- ☆14Nov 12, 2021Updated 4 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Random Codes Related to Reverse Engineering☆10Nov 24, 2022Updated 3 years ago
- Frida depends on Vala☆11Feb 16, 2026Updated 2 weeks ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago