Linux Binary Exploitation
-
Updated
Jun 15, 2021 - C
Linux Binary Exploitation
Exploit Windows-Based BufferOverflow (vulnserver)
buffer overflow exploits for simple c programs (64 bit)
Information security project. This is a collection of ELF binaries exploits to better understand how memory works.
Information security project. This is a collection of ELF Binary exploits to expand your knowledge of security breaches, undefined behaviour and memory management.
Cool exploitation assignments!
Research about Buffer Overflow Attack vulnerability.
Return-to-libc buffer overflow attack.
This repo deals with Buffer Overflow, Integer Overflow, Format String, etc.
Computer security labs. HRY414-assignments
Performing Buffer Overflow attack using stack smashing approach to obtain the shell. Given a C compiled vulnerable software, with the help of reverse engineering and debugging the attack had to be conducted to obtain the shell.
Heap Exploit for a new root user in /etc/passwd
These are some of the assignments of class CS-255 from the University of Crete Department of Computer Science, that were completed by me from start to finish.
An x86_64 Buffer Overflow Lab for UAF's Cyber Security Club
A CTF-like project about ELF32/64 binary exploitation & buffer overflows
Learning more about reverse engineering and buffer overflow attacks
Security in Systems and Services projects for ECE TUC
Collection of stack smashing exploits and buffer overflow attacks
A C programming language script that will buffer your rams and stop you cumputer
Add a description, image, and links to the buffer-overflow-attack topic page so that developers can more easily learn about it.
To associate your repository with the buffer-overflow-attack topic, visit your repo's landing page and select "manage topics."