Linux Binary Exploitation
-
Updated
Jun 15, 2021 - C
Linux Binary Exploitation
Exploit Development, Reverse Engineering & Cryptography
Very simple script(s) to hasten binary exploit creation
A binary ninja plugin that finds format string vulnerabilities
Examples of Binary Exploitations - Buffer Overflow, Return-Oriented Programming and Format String
#RomHack21 raptor's party pack.
Python format string vulnerability exploitation challenge
Performing an exploit of Format String Vulnerability to leak information. Given a C compiled vulnerable software, with the help of reverse engineering and debugging; the attack had to be conducted to obtain dumb and smart leak of information.
Some exercises from my System and Network Hacking course @ University of Pisa
The repository links to the collection of repositories that performs various Software Vulnerability Analysis and Exploits using different tools and methods.
42 Cybersec projects
Notes and exploits
⚙️ Comprehensive Linux system programming repository featuring C examples for process management, file systems, memory management, IPC, and practical security vulnerability demonstrations with Docker-based testing environments.
Information security project. This is a collection of ELF binaries exploits to better understand how memory works.
Information security project. This is a collection of ELF Binary exploits to expand your knowledge of security breaches, undefined behaviour and memory management.
A CTF-like project about ELF32/64 binary exploitation & buffer overflows
Advanced Binary Attack CTF
Solutions for some buffer overflow challenges
CTF on overflows and format strings attacks
Add a description, image, and links to the format-string-attack topic page so that developers can more easily learn about it.
To associate your repository with the format-string-attack topic, visit your repo's landing page and select "manage topics."