A shared (dynamic) library that can be transparently injected into different processes to detect memory corruption in glibc heap
-
Updated
May 10, 2018 - C
A shared (dynamic) library that can be transparently injected into different processes to detect memory corruption in glibc heap
This repository contains exploit to the webserver from the NETWORK_PROGRAMS repository.
This repository contains exploits to Windows binaries provided by Exploit2 course by opensecuritytraining.
All things Binary Exploitation, Memory, Assembly and Corruptions.
A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
Port of memtester to Android, with modifications to build a standalone binary using ndk-build. This is similar to memtest86 on x86 PCs which tests for RAM errors and memory corruption.
Buffer Overflow in Seattle Lab Mail (SLmail) 5.5 - POP3
Traditional Mitigation in GCC to defend Memory Corruption Vulnerability
A mock (awful) ctf built to practice binary exploitation
Advanced buffer overflow and memory corruption security challenges
PoC for CVE-2022-21974 "Roaming Security Rights Management Services Remote Code Execution Vulnerability"
PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"
PoC for CVE-2022-28281 a Mozilla Firefox Out of bounds write.
Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.
PoC exploits against various SGX enclaves
Writeups and solver scripts wrote for CTFS and Wargames, mostly memory corruption and reverse engineering tasks.
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
Demo project & blog post to demonstrate the use of build schemes in Xcode, diagnosing memory corruption and crashes, sanitizers, analyzing crash logs and symbolication.
Writeups of some of the Binary Exploitation challenges that I have solved during CTF.
Add a description, image, and links to the memory-corruption topic page so that developers can more easily learn about it.
To associate your repository with the memory-corruption topic, visit your repo's landing page and select "manage topics."