Decoding the Frustrations and Vulnerabilities of Modern Text Processing - PyCon AU 2017
-
Updated
Dec 8, 2017 - Jupyter Notebook
Decoding the Frustrations and Vulnerabilities of Modern Text Processing - PyCon AU 2017
PSMCCLI PoC in Pinky's Palace V3 by https://twitter.com/ju256_
华中科技大学软件安全课程设计2019
Performing an exploit of Format String Vulnerability to leak information. Given a C compiled vulnerable software, with the help of reverse engineering and debugging; the attack had to be conducted to obtain dumb and smart leak of information.
The repository links to the collection of repositories that performs various Software Vulnerability Analysis and Exploits using different tools and methods.
Software based Side Channel attacks
Exploit Development, Reverse Engineering & Cryptography
A binary ninja plugin that finds format string vulnerabilities
Notes and exploits
Some exercises from my System and Network Hacking course @ University of Pisa
Python format string vulnerability exploitation challenge
Very simple script(s) to hasten binary exploit creation
Linux Binary Exploitation
A CTF-like project about ELF32/64 binary exploitation & buffer overflows
Information security project. This is a collection of ELF binaries exploits to better understand how memory works.
Information security project. This is a collection of ELF Binary exploits to expand your knowledge of security breaches, undefined behaviour and memory management.
Solutions for some buffer overflow challenges
Examples of Binary Exploitations - Buffer Overflow, Return-Oriented Programming and Format String
42 Cybersec projects
Add a description, image, and links to the format-string-attack topic page so that developers can more easily learn about it.
To associate your repository with the format-string-attack topic, visit your repo's landing page and select "manage topics."