This is an example buffer overflow attack on a small vulnerable C program.
☆81Apr 27, 2016Updated 9 years ago
Alternatives and similar repositories for buffer-overflow-attack
Users that are interested in buffer-overflow-attack are comparing it to the libraries listed below
Sorting:
- An introduction to buffer overflow vulnerabilities exploitation.☆14Oct 21, 2022Updated 3 years ago
- Doing research on top of Jalangi☆12Sep 9, 2016Updated 9 years ago
- ☆15May 17, 2018Updated 7 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- rewrite subset of linux 2.6 by OOP, C++ advanced topics☆10Jul 22, 2021Updated 4 years ago
- like ROP Defender☆10May 6, 2015Updated 10 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆19Feb 14, 2020Updated 6 years ago
- Implementation of the NCA-GE model from "Approximating Network Centrality Measures Using Node Embedding and Machine Learning"☆11Sep 7, 2020Updated 5 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- ☆32Oct 21, 2023Updated 2 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆57Jul 5, 2019Updated 6 years ago
- Code repository for the VLDB2023 paper "Zebra: When Temporal Graph Neural Networks Meet Temporal Personalized PageRank".☆11Apr 26, 2024Updated last year
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- Bytecode based Fuzzer for the PHP language☆12Jul 22, 2020Updated 5 years ago
- ☆22Jun 23, 2016Updated 9 years ago
- SHA-3 Keccak implementation in C.☆20Jun 1, 2015Updated 10 years ago
- Good For OSCP Training☆443Jan 26, 2019Updated 7 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- Modified version of PULP Ara to support Vector Cryptography (Zvk) Instructions☆17Jan 21, 2026Updated 2 months ago
- ☆15Jun 7, 2017Updated 8 years ago
- A toy Linux rootkit.☆13May 10, 2013Updated 12 years ago
- Scripts to automatically create VM images☆15Oct 4, 2025Updated 5 months ago
- ☆12Mar 23, 2024Updated last year
- Vulnerable Windows 32bit executables for OSCP exam training☆19Dec 12, 2020Updated 5 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- allperlbooks.com data☆10Oct 20, 2024Updated last year
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- Exploit script for Apache Struts2 REST Plugin XStream RCE (CVE-2017-9805)☆15Nov 26, 2020Updated 5 years ago
- ☆13Mar 19, 2022Updated 4 years ago
- ProFTPD IAC Remote Root Exploit☆37Aug 13, 2017Updated 8 years ago
- ☆13Nov 22, 2022Updated 3 years ago
- experiments for IJON☆12Jul 1, 2019Updated 6 years ago
- ☆16Jan 12, 2022Updated 4 years ago
- Exploit for CVE-2022-27226☆15Mar 19, 2022Updated 4 years ago
- LLVM compile-time performance data over time (repo 0).☆19Sep 30, 2023Updated 2 years ago
- Simple Email/MMS spoofer included mass mail attack feature and a compatible mobile version☆23May 17, 2018Updated 7 years ago
- An Introduction to Mojolicious By Example☆10Sep 9, 2020Updated 5 years ago