Year: 3rd, Semester: 1st, Course: Fundamentos de Segurança Informática (FSI)
-
Updated
Feb 16, 2024
Year: 3rd, Semester: 1st, Course: Fundamentos de Segurança Informática (FSI)
#RomHack21 raptor's party pack.
Buffer Overflows, Format Strings, Return Over Pointers and Shellcode Execution Attacks
Advanced Binary Attack CTF
advanced CTF on overflows and format strings attacks
CTF on overflows and format strings attacks
Python script that can be used to craft a string to perform a format string attack in a 32bit system.
42 Cybersec projects
Examples of Binary Exploitations - Buffer Overflow, Return-Oriented Programming and Format String
Solutions for some buffer overflow challenges
Information security project. This is a collection of ELF Binary exploits to expand your knowledge of security breaches, undefined behaviour and memory management.
Information security project. This is a collection of ELF binaries exploits to better understand how memory works.
A CTF-like project about ELF32/64 binary exploitation & buffer overflows
Linux Binary Exploitation
Very simple script(s) to hasten binary exploit creation
Python format string vulnerability exploitation challenge
Some exercises from my System and Network Hacking course @ University of Pisa
Notes and exploits
A binary ninja plugin that finds format string vulnerabilities
Add a description, image, and links to the format-string-attack topic page so that developers can more easily learn about it.
To associate your repository with the format-string-attack topic, visit your repo's landing page and select "manage topics."