Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.
翻译 - Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.
Analysis of the vulnerability
华中科技大学软件安全课程设计2019
Reasonable Overflow is a programming library that aims to prevent unreasonable numbers during an integer overflow, and maybe even stop integer overflows themselves. Written in many languages.
Overcomes the integer overflow problem by using arrays to represent values, algorithm can compute HUGE Fibonacci sequences very fast, O(nk) time.
Denial-of-Service PoC | Writeup | Header with CLFS structures | Imhex pattern for .blf extension
Information security project. This is a collection of ELF binaries exploits to better understand how memory works.
A C project made as a part of the Secure Programming with C course (UE18CS257C) course at PES University. The objective of the project was to display the effects of integer overflows in the C programm...
Solving https://adventofcode.com/2022/day/11
Golang package for integer arithmetic with overflow detection.
Vulnerable codes and their fix in C (Over & Underflows)
simple C projects from college course Intro to programming
PWN101. Step-by-step tutorials on some binary exploitation stack-based techniques.