Linux Binary Exploitation
-
Updated
Jun 15, 2021 - C
Linux Binary Exploitation
Performing Buffer Overflow attack using stack smashing approach to obtain the shell. Given a C compiled vulnerable software, with the help of reverse engineering and debugging the attack had to be conducted to obtain the shell.
buffer overflow exploits for simple c programs (64 bit)
Stack Buffer Overflow Attack - How It's done with code provided.
Cool exploitation assignments!
This project is an introduction to the exploitation of (elf-like) binary.
Research about Buffer Overflow Attack vulnerability.
This repo deals with Buffer Overflow, Integer Overflow, Format String, etc.
A CTF-like project about ELF32/64 binary exploitation & buffer overflows
Heap Exploit for a new root user in /etc/passwd
An x86_64 Buffer Overflow Lab for UAF's Cyber Security Club
Information security challenge, taking advantage of a vulnerable ISO and its systems to become root.
x64 version of Smashing the Stack for Fun and Profit
A buffer overflow attack
Information security project. This is a collection of ELF binaries exploits to better understand how memory works.
Buffer Overflow attack on Windows XP
Security in the context of Software-Source code analysis, Buffer Overflow and Web Security
Information security project. This is a collection of ELF Binary exploits to expand your knowledge of security breaches, undefined behaviour and memory management.
Safe string library for C language.
Add a description, image, and links to the buffer-overflow-attack topic page so that developers can more easily learn about it.
To associate your repository with the buffer-overflow-attack topic, visit your repo's landing page and select "manage topics."