npapernot / buffer-overflow-attack
This is an example buffer overflow attack on a small vulnerable C program.
☆79Updated 8 years ago
Alternatives and similar repositories for buffer-overflow-attack:
Users that are interested in buffer-overflow-attack are comparing it to the libraries listed below
- Spectre exploit☆55Updated 7 years ago
- An introduction to buffer overflow vulnerabilities exploitation.☆14Updated 2 years ago
- Collection of Linux shellcodes☆71Updated 8 years ago
- Kernel Hacking study materials collection☆107Updated 8 years ago
- Writeup for picoCTF 2018☆125Updated 2 years ago
- Contains Attack labs☆151Updated 6 years ago
- Guide to buffer overflows☆58Updated 3 years ago
- SPRITZ plays CTFs! Writeups by spritzers☆63Updated 7 years ago
- ☆22Updated 8 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆35Updated 4 years ago
- VoidHack CTF write-ups☆59Updated 5 years ago
- A collection of some interesting network security projects☆57Updated 6 years ago
- My Collection of x64 Assembly programs with NASM☆21Updated 6 years ago
- Linux Exploits☆138Updated 9 years ago
- A simple attack against gcc and Python via kernel module, with highly detailed comments.☆21Updated 10 years ago
- A tiny framework for easily manipulate the tty and create fake binaries.☆155Updated 4 years ago
- Practical Return to Libc in 12 Minutes Presentation + practice for CS3235 YouTeach project.☆52Updated 8 years ago
- ☆26Updated 6 years ago
- Generate JSON system call info from Linux source☆148Updated 3 years ago
- Writeup oriented CTF☆22Updated 7 years ago
- A semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities☆129Updated 7 years ago
- Hacking: The Art of Exploitation, 2nd Edition☆24Updated 11 years ago
- My MS thesis on survey of a decade fo Linux Kernel CVEs, their categories and various mitigations that exist.☆155Updated 6 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆19Updated 8 years ago
- 🔓 x86 Linux Kernel rootkit for Debian 9 (4.9.0-11-686-pae)☆34Updated 4 years ago
- Useful tips by OTA CTF members☆138Updated 5 years ago
- EmpireCTF – write-ups, capture the flag, cybersecurity☆131Updated 3 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆95Updated 7 years ago
- File compression library | Shennon | Fano | Huffman | Bigram Huffman | Adaptive Huffman | Arithmetic coding☆12Updated 4 years ago
- Writeups/solutions☆94Updated 4 years ago