Linux Binary Exploitation
翻译 - Linux 二进制开发
Exploit Development, Reverse Engineering & Cryptography
Very simple script(s) to hasten binary exploit creation
A binary ninja plugin that finds format string vulnerabilities
Examples of Binary Exploitations - Buffer Overflow, Return-Oriented Programming and Format String
#RomHack21 raptor's party pack.
Python format string vulnerability exploitation challenge
华中科技大学软件安全课程设计2019
Performing an exploit of Format String Vulnerability to leak information. Given a C compiled vulnerable software, with the help of reverse engineering and debugging; the attack had to be conducted to ...
Some exercises from my System and Network Hacking course @ University of Pisa
The repository links to the collection of repositories that performs various Software Vulnerability Analysis and Exploits using different tools and methods.
42 Cybersec projects
Information security project. This is a collection of ELF Binary exploits to expand your knowledge of security breaches, undefined behaviour and memory management.
Information security project. This is a collection of ELF binaries exploits to better understand how memory works.
Notes and exploits
A CTF-like project about ELF32/64 binary exploitation & buffer overflows
Software based Side Channel attacks
Python script that can be used to craft a string to perform a format string attack in a 32bit system.
Buffer Overflows, Format Strings, Return Over Pointers and Shellcode Execution Attacks