Linux Binary Exploitation
-
Updated
Jun 15, 2021 - C
Linux Binary Exploitation
Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs
Customizable TCP fuzzing tool to test for remote buffer overflows.
Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized
Shellcode / Buffer Overflow 💣
Tool for finding Buffer Overflows in simple binaries. CTF use mainly.
Stack based buffer overflows attacks made simple. BufferSploit is a semi automated CLI based tool for performing stack based buffer overflow attacks with ease.
Performing Buffer Overflow attack using stack smashing approach to obtain the shell. Given a C compiled vulnerable software, with the help of reverse engineering and debugging the attack had to be conducted to obtain the shell.
An exploit for installing a softmod to the Xbox
buffer overflow exploits for simple c programs (64 bit)
These are the scripts & methodologies that can be used in Buffer Over Flow Fuzzing and Exploitation
Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.
CSAPP - Buffer Overflow Attacks / Bufbomb Lab
A guide to vanilla buffer overflow exploitation with the help of brainpan-vm.
Bogas is a set of scripts for fuzzing applications (x86 optimally) and aiding in buffer overflow generation. Optimal for OSCP training.
BuffMate is a Perl buffer overflow tool
Buff 💪. A simple BOF library I wrote under an hour to help me automate with BOF attack.
Examples of Binary Exploitations - Buffer Overflow, Return-Oriented Programming and Format String
Add a description, image, and links to the buffer-overflow-attack topic page so that developers can more easily learn about it.
To associate your repository with the buffer-overflow-attack topic, visit your repo's landing page and select "manage topics."