Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.
-
Updated
Apr 25, 2022 - Python
Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.
Analysis of the vulnerability
华中科技大学软件安全课程设计2019
Reasonable Overflow is a programming library that aims to prevent unreasonable numbers during an integer overflow, and maybe even stop integer overflows themselves. Written in many languages.
Overcomes the integer overflow problem by using arrays to represent values, algorithm can compute HUGE Fibonacci sequences very fast, O(nk) time.
Denial-of-Service PoC | Writeup | Header with CLFS structures | Imhex pattern for .blf extension
PWN101. Step-by-step tutorials on some binary exploitation stack-based techniques.
simple C projects from college course Intro to programming
Demonstration of year 2038 problem in C
Demonstration of year 2038 problem in Rust
Information security project. This is a collection of ELF binaries exploits to better understand how memory works.
Automatic checked arithmetic operations in Rust
Golang package for integer arithmetic with overflow detection.
Demonstration of Nuclear Gandhi AI Bug
Vulnerable codes and their fix in C (Over & Underflows)
illustrating and testing long int behavior in Rcpp
A C project made as a part of the Secure Programming with C course (UE18CS257C) course at PES University. The objective of the project was to display the effects of integer overflows in the C programming language the necessary steps required to prevent such errors in product development.
Demonstration of year 2038 problem in C++
Add a description, image, and links to the integer-overflow topic page so that developers can more easily learn about it.
To associate your repository with the integer-overflow topic, visit your repo's landing page and select "manage topics."