npapernot / buffer-overflow-attack
This is an example buffer overflow attack on a small vulnerable C program.
☆79Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for buffer-overflow-attack
- Spectre exploit☆55Updated 6 years ago
- Meltdown Exploit / Proof-of-concept / checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDO…☆542Updated 6 years ago
- A simple ELF Virus that can execute malacious code, infect other ELF files, and execute the host file's code normally.☆41Updated 6 years ago
- My Collection of x64 Assembly programs with NASM☆20Updated 6 years ago
- Guide to buffer overflows☆58Updated 3 years ago
- 🔓 x86 Linux Kernel rootkit for Debian 9 (4.9.0-11-686-pae)☆33Updated 4 years ago
- An introduction to buffer overflow vulnerabilities exploitation.☆14Updated 2 years ago
- Meltdown PoC for reading passwords from Google Chrome.☆470Updated 6 years ago
- Collection of Linux shellcodes☆70Updated 8 years ago
- Contains Attack labs☆151Updated 5 years ago
- A collection of some interesting network security projects☆52Updated 6 years ago
- Red-team tool to hook libc read syscall with a buffer overflow vulnerability.☆34Updated 5 years ago
- Writeup for picoCTF 2018☆125Updated 2 years ago
- Collection of articles about realmode 16bit assembly☆60Updated last year
- Buffer Overflow Exploitation Examples☆39Updated 6 years ago
- Practical Return to Libc in 12 Minutes Presentation + practice for CS3235 YouTeach project.☆52Updated 8 years ago
- Writeup oriented CTF☆22Updated 7 years ago
- Kernel Hacking study materials collection☆106Updated 8 years ago
- Intro to x86 Assembly Language.☆264Updated 4 years ago
- Write-ups of the challenges on pwnable.kr☆20Updated 4 years ago
- Just another (unfinished) kernel from scratch...☆43Updated 2 years ago
- A linux rootkit works on kernel 4.0.X or higher☆34Updated 8 years ago
- Hacking: The Art of Exploitation, 2nd Edition☆24Updated 10 years ago
- Always Keep Learning☆52Updated 2 years ago
- Downloads VirusShare hashes (https://virusshare.com/hashes.4n6) and searches them for specified MD5 hashes☆70Updated 3 years ago
- Good to know, easy to forget information about binaries and their exploitation!☆67Updated 7 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆33Updated 4 years ago
- ☆26Updated 6 years ago