HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
-
Updated
Feb 3, 2024 - C
HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux
PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"
A shared (dynamic) library that can be transparently injected into different processes to detect memory corruption in glibc heap
A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
Advanced buffer overflow and memory corruption security challenges
Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.
Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stage during the Pwn2Own Miami 2022 competition.
PoC for CVE-2022-28281 a Mozilla Firefox Out of bounds write.
PoC for CVE-2022-21974 "Roaming Security Rights Management Services Remote Code Execution Vulnerability"
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
Traditional Mitigation in GCC to defend Memory Corruption Vulnerability
This repository contains exploit to the webserver from the NETWORK_PROGRAMS repository.
All things Binary Exploitation, Memory, Assembly and Corruptions.
Writeups and solver scripts wrote for CTFS and Wargames, mostly memory corruption and reverse engineering tasks.
Writeups of some of the Binary Exploitation challenges that I have solved during CTF.
PoC exploits against various SGX enclaves
This repository contains exploits to Windows binaries provided by Exploit2 course by opensecuritytraining.
A mock (awful) ctf built to practice binary exploitation
Explore the depths of stack memory management, from basic concepts to algorithms governing procedure calls/returns, all articulated through comprehensive guides.
Buffer Overflow in Seattle Lab Mail (SLmail) 5.5 - POP3
Add a description, image, and links to the memory-corruption topic page so that developers can more easily learn about it.
To associate your repository with the memory-corruption topic, visit your repo's landing page and select "manage topics."