Linux Binary Exploitation
翻译 - Linux 二进制开发
Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs
Customizable TCP fuzzing tool to test for remote buffer overflows.
Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized
Tool for finding Buffer Overflows in simple binaries. CTF use mainly.
CS 33: Introduction to Computer Organization
Stack based buffer overflows attacks made simple. BufferSploit is a semi automated CLI based tool for performing stack based buffer overflow attacks with ease.
Performing Buffer Overflow attack using stack smashing approach to obtain the shell. Given a C compiled vulnerable software, with the help of reverse engineering and debugging the attack had to be con...
An exploit for installing a softmod to the Xbox
These are the scripts & methodologies that can be used in Buffer Over Flow Fuzzing and Exploitation
buffer overflow exploits for simple c programs (64 bit)
Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.
INE/eLearnSecurity Certified Professional Penetration Tester (eCPPT) / PTP v2 and v3 Notes
A guide to vanilla buffer overflow exploitation with the help of brainpan-vm.
Bogas is a set of scripts for fuzzing applications (x86 optimally) and aiding in buffer overflow generation. Optimal for OSCP training.
BuffMate is a Perl buffer overflow tool
Examples of Binary Exploitations - Buffer Overflow, Return-Oriented Programming and Format String