Buffer Overflow attacks on Linux
-
Updated
Apr 24, 2021 - C
Buffer Overflow attacks on Linux
Linux 2.6.39 Sürümüne Göre Uygun Olan Bir Exploit
Exploit randomness to beat vulnerable Blackjack. 利用随机漏洞完胜庄家21点。
Redis Exploitation Toolkit - A tool to pwn Redis server before the bad guys do!
Materials, notes, and talks about binary exploitation & RE
A WIP game focused on hacking
xorencode.c encode your shellcode
Course materials for Modern Binary Exploitation by RPISEC
Pentest, CTF - TrailOfBits CTF Field Guide
This is an assignment I completed as an undergraduate student in Technical University of Crete.
Binary exploitation & Reverse engineering (assembly to C)
Security in the context of Software-Source code analysis, Buffer Overflow and Web Security
Files associated with my blog post on memory deduplication attacks.
A CTF-like project about ELF32/64 binary exploitation & buffer overflows
Cool exploitation assignments!
[WIP] some MIPS exploitation challenges, covering stack and heap based overflows
Add a description, image, and links to the exploitation topic page so that developers can more easily learn about it.
To associate your repository with the exploitation topic, visit your repo's landing page and select "manage topics."