Advanced buffer overflow and memory corruption security challenges
-
Updated
Feb 18, 2022 - C++
Advanced buffer overflow and memory corruption security challenges
Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard communication protocol for each service.
Code to Demonstrate Buffer Overflow Vulnerability in Simple Authentication Apps
Avoid using unsafe functions in your C/C++ code.
A C++23 buffer type with compile-time checked slice/view/join operations
A fixed-width string class for C++11
This application sends random data through the serial port for a user defined time.
Simple crackme for my groupmate
Compile-time-checked C++20 buffer.
This assignment presents code that collects a number from the user and then displays the number and a secret account number. Entering too many characters triggers the overwrite of the account number. Using the existing source code as a starting point, you need to prevent the user input from impacting the account number.
SecRetAddress is a GCC plugin to protect the return address override
CSE 4118 Cryptography and Security Lab
Clang plugin which fills structure pads to provoke buffer overflow errors
OpenU Course 20937 Work
Add a description, image, and links to the buffer-overflow topic page so that developers can more easily learn about it.
To associate your repository with the buffer-overflow topic, visit your repo's landing page and select "manage topics."