exploit vulnerable c/c++ programms with buffer overflow attacks
☆24Jul 18, 2022Updated 3 years ago
Alternatives and similar repositories for buffer-overflow
Users that are interested in buffer-overflow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Data and scripts for the paper "Polymorphic Type Inference for Machine Code"☆13Apr 12, 2016Updated 9 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- PCB files for Adafruit 40-pin TFT Friend / Breakout Board☆13Jun 14, 2019Updated 6 years ago
- A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf☆133Jan 9, 2018Updated 8 years ago
- Elm language constructs ported to TypeScript☆14Apr 5, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆25Nov 21, 2024Updated last year
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Oct 18, 2017Updated 8 years ago
- Linux kernels (CGC DECREE and vanilla) with S2E extensions☆24Jul 6, 2024Updated last year
- ActionScript3 dynamic instrumentation tool☆36Mar 15, 2017Updated 9 years ago
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- Analog distortion emulation lv2 plugins☆23Oct 1, 2019Updated 6 years ago
- Linux Memory Cryptographic Keys Extractor☆242May 22, 2023Updated 2 years ago
- [DEPRECATED] A symbolic execution engine for the VEX IR☆80Sep 27, 2018Updated 7 years ago
- A plugin to integrate an IPython kernel into Binary Ninja.☆30Jun 27, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- GUI tool to create ROP chains using the ropper API☆159Mar 30, 2018Updated 8 years ago
- Python-based interactive assembler/disassembler CLI, powered by Keystone/Capstone.☆31Jan 27, 2017Updated 9 years ago
- ☆26Jun 4, 2018Updated 7 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆17Sep 10, 2024Updated last year
- OCaml adapters for crypto providers used in Everest☆10Sep 13, 2018Updated 7 years ago
- Ghidra is a software reverse engineering (SRE) framework☆11Jan 2, 2025Updated last year
- Chrome extension: password generator from master key using PBKDF2 with SHA-256.☆19Sep 14, 2015Updated 10 years ago
- DEPRECATED: Element Hiding Helper extension for Adblock Plus☆11Dec 1, 2017Updated 8 years ago
- PassDock public issue tracker.☆23Nov 11, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Home to the ActorTrackr source code☆24Jun 21, 2017Updated 8 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- ILANDS Sensor traffic data analysis software packages☆10Updated this week
- Command line Teensy Loader☆11Sep 21, 2015Updated 10 years ago
- Encoders and Decoders for RF and IR protocols used for remote control and data acquisition. Both Encoders and Decoders can be supplied as…☆13Jul 29, 2017Updated 8 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- A Firefox add-on that warns about changing certificates☆12Dec 1, 2019Updated 6 years ago
- Docker files for Miasm☆17Apr 27, 2018Updated 7 years ago
- OwnTracks Recorder (Homebrew)☆12Oct 25, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Transfer EIP control to shellcode during malware analysis investigation☆77Oct 29, 2014Updated 11 years ago
- A Python-based security assessment tool for continuous automated security scanning and monitoring of domains.☆13Apr 4, 2025Updated last year
- ☆16Sep 6, 2017Updated 8 years ago
- ☆13Dec 2, 2021Updated 4 years ago
- AIS3 2017 Binary Exploitation☆38Sep 3, 2017Updated 8 years ago
- Sample of a Malicious baseband signed by Apple☆10May 12, 2022Updated 3 years ago
- My dotfiles☆11Mar 27, 2026Updated 2 weeks ago