HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
-
Updated
Feb 3, 2024 - C
HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
#INFILTRATE19 raptor's party pack.
buffer-overflow
Exploit Windows-Based BufferOverflow (vulnserver)
#INFILTRATE20 raptor's party pack.
WPI CS2011 Assembly Assignments for B-term 2017
Red-team tool to hook libc read syscall with a buffer overflow vulnerability.
Intentionally vulnerable Linux application for buffer overflow and RCE development practice
buffer overflow exploits for simple c programs (64 bit)
Implementation of C11 Annex K "Bounds-checking interfaces" ISO/IEC 9899:2011
Payloads for buffer overflows and other exploits
stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system
A server for testing shellcode injection over a buffer overflow
Writeups of some of the Binary Exploitation challenges that I have solved during CTF.
SCRYPT is a simple shellcode encryptor/encoder that uses the OpenSSL library to encrypt a shellcode using the AES-256-CBC encryption algorithm then applies several encoding techniques to obfuscate a given shellcode file. This encrypted/encoded shellcode can be used for both legitimate and malicious purposes, such as exploiting system vulnerability
Ivan Ricart Borges - WarFTP is prone to a stack-based buffer-overflow vulnerability because it fails to properly check boundaries on user-supplied data before copying it to an insufficiently sized buffer.
My course work about basic binary exploitation.🤿
The FreeBSD ICMP buffer overflow, freebsd buffer overflow poc
The Perfect Hack! - IEEE NITK Edify Workshop
Add a description, image, and links to the buffer-overflow topic page so that developers can more easily learn about it.
To associate your repository with the buffer-overflow topic, visit your repo's landing page and select "manage topics."