Buffer Overflows, Format Strings, Return Over Pointers and Shellcode Execution Attacks
-
Updated
Oct 8, 2023 - C
Buffer Overflows, Format Strings, Return Over Pointers and Shellcode Execution Attacks
CTF on overflows and format strings attacks
42 Cybersec projects
Python script that can be used to craft a string to perform a format string attack in a 32bit system.
Advanced Binary Attack CTF
Solutions for some buffer overflow challenges
A CTF-like project about ELF32/64 binary exploitation & buffer overflows
Decoding the Frustrations and Vulnerabilities of Modern Text Processing - PyCon AU 2017
Software based Side Channel attacks
The repository links to the collection of repositories that performs various Software Vulnerability Analysis and Exploits using different tools and methods.
Notes and exploits
Performing an exploit of Format String Vulnerability to leak information. Given a C compiled vulnerable software, with the help of reverse engineering and debugging; the attack had to be conducted to obtain dumb and smart leak of information.
advanced CTF on overflows and format strings attacks
Year: 3rd, Semester: 1st, Course: Fundamentos de Segurança Informática (FSI)
A binary ninja plugin that finds format string vulnerabilities
#RomHack21 raptor's party pack.
华中科技大学软件安全课程设计2019
Examples of Binary Exploitations - Buffer Overflow, Return-Oriented Programming and Format String
Information security project. This is a collection of ELF Binary exploits to expand your knowledge of security breaches, undefined behaviour and memory management.
Add a description, image, and links to the format-string-attack topic page so that developers can more easily learn about it.
To associate your repository with the format-string-attack topic, visit your repo's landing page and select "manage topics."