Vulnerable codes and their fix in C (Over & Underflows)
-
Updated
Oct 12, 2024 - C
Vulnerable codes and their fix in C (Over & Underflows)
My assignments on GDB and Computer Architecture; Buffer Overflow; Stack Overflow and ROP gadgets; ASLR; Heap Overflow; Type Confusion; Injection Attack; Fuzzing.
Exploits R&D
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
PoC to Leak QT-5/6 Heap via Images
Binary Exploitation CTF
A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes
A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes
Ripple20 Critical Vulnerabilities - Detection Logic and Signatures
Software based Side Channel attacks
This repository contains the exploits to Linux VM binaries provided by Exploits1 course by opensecuritytraining
Add a description, image, and links to the heap-overflow topic page so that developers can more easily learn about it.
To associate your repository with the heap-overflow topic, visit your repo's landing page and select "manage topics."