Skip to content

Repository of Ruby related buffer overflow boilerplates

Notifications You must be signed in to change notification settings

dievus/bufferoverflow

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

rubybufferoverflow

Ruby Buffer Overflow Boilerplate

The use of the boilerplate should be relatively straight forward. Line 2 requires you to add your offset value determined after your initial fuzzing and examination of the vulnerable program. Line 3 is reserved for the JMP ESP you determine. Line 4 is for additional no-ops, and can be changed to your needs. Line 5 is reserved for your shellcode which, if using Ruby, can be inserted inside of the quotations. Line 10 is reserved for connection interaction, and requires you to change the "ipaddress" to your target, and insert the vulnerable port in the "portvalue" location.

Python BoF contains various Python scripts I have found useful for stack overflow exploitation utilizing Python.

About

Repository of Ruby related buffer overflow boilerplates

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published