Security in the context of Software-Source code analysis, Buffer Overflow and Web Security
-
Updated
Apr 20, 2017 - C
Security in the context of Software-Source code analysis, Buffer Overflow and Web Security
A game I researched, got arbitrary code execution on the game server.
Binary exploitation & Reverse engineering (assembly to C)
Buffer Overflow attacks on Linux
Linux 2.6.39 Sürümüne Göre Uygun Olan Bir Exploit
TL;DR: Mutate a binary to identify potential exploit candidates
A WIP game focused on hacking
xorencode.c encode your shellcode
Exploit randomness to beat vulnerable Blackjack. 利用随机漏洞完胜庄家21点。
Course materials for Modern Binary Exploitation by RPISEC
Pentest, CTF - TrailOfBits CTF Field Guide
This is an assignment I completed as an undergraduate student in Technical University of Crete.
Files associated with my blog post on memory deduplication attacks.
A CTF-like project about ELF32/64 binary exploitation & buffer overflows
A faster version of AFL-Fuzz used for DARPA Cyber Grand Challenge with optimized scheduler code
Materials, notes, and talks about binary exploitation & RE
Redis Exploitation Toolkit - A tool to pwn Redis server before the bad guys do!
Add a description, image, and links to the exploitation topic page so that developers can more easily learn about it.
To associate your repository with the exploitation topic, visit your repo's landing page and select "manage topics."