A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
-
Updated
May 7, 2023 - C
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
Writeups of some of the Binary Exploitation challenges that I have solved during CTF.
Fully Randomized Pointers
A set of example C programs that demonstrate common programming mistakes, and provides results on which static code analyzers can detect these mistakes.
CWE-416 Use-After-Free Vulnerability, Attack and Fix
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
Add a description, image, and links to the use-after-free topic page so that developers can more easily learn about it.
To associate your repository with the use-after-free topic, visit your repo's landing page and select "manage topics."