Buffer Overflows, Format Strings, Return Over Pointers and Shellcode Execution Attacks
-
Updated
Oct 8, 2023 - C
Buffer Overflows, Format Strings, Return Over Pointers and Shellcode Execution Attacks
CTF on overflows and format strings attacks
Information security project. This is a collection of ELF binaries exploits to better understand how memory works.
Advanced Binary Attack CTF
Python script that can be used to craft a string to perform a format string attack in a 32bit system.
Solutions for some buffer overflow challenges
Decoding the Frustrations and Vulnerabilities of Modern Text Processing - PyCon AU 2017
Software based Side Channel attacks
advanced CTF on overflows and format strings attacks
Year: 3rd, Semester: 1st, Course: Fundamentos de Segurança Informática (FSI)
Information security project. This is a collection of ELF Binary exploits to expand your knowledge of security breaches, undefined behaviour and memory management.
A CTF-like project about ELF32/64 binary exploitation & buffer overflows
Notes and exploits
PSMCCLI PoC in Pinky's Palace V3 by https://twitter.com/ju256_
42 Cybersec projects
Some exercises from my System and Network Hacking course @ University of Pisa
The repository links to the collection of repositories that performs various Software Vulnerability Analysis and Exploits using different tools and methods.
#RomHack21 raptor's party pack.
Python format string vulnerability exploitation challenge
Add a description, image, and links to the format-string-attack topic page so that developers can more easily learn about it.
To associate your repository with the format-string-attack topic, visit your repo's landing page and select "manage topics."