Here are
20 public repositories
matching this topic...
HackSys Extreme Vulnerable Windows Driver
PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"
Updated
Feb 26, 2022
Rich Text Format
A WIP "Vulnerable by Design" kext for iOS/macOS to play & learn *OS kernel exploitation
Advanced buffer overflow and memory corruption security challenges
A shared (dynamic) library that can be transparently injected into different processes to detect memory corruption in glibc heap
Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.
Updated
Feb 19, 2022
Python
PoC for CVE-2022-21974 "Roaming Security Rights Management Services Remote Code Execution Vulnerability"
Updated
Feb 26, 2022
Rich Text Format
Traditional Mitigation in GCC to defend Memory Corruption Vulnerability
Writeups and solver scripts wrote for CTFS and Wargames, mostly memory corruption and reverse engineering tasks.
Updated
Dec 27, 2021
Assembly
PoC exploits against various SGX enclaves
Updated
May 7, 2020
Makefile
All things Binary Exploitation, Memory, Assembly and Corruptions.
Updated
Sep 25, 2020
Python
Writeups of some of the Binary Exploitation challenges that I have solved during CTF.
Updated
Mar 11, 2022
Python
This repository contains exploit to the webserver from the NETWORK_PROGRAMS repository.
This repository contains exploits to Windows binaries provided by Exploit2 course by opensecuritytraining.
Some of my Binary Exploitation Write-Ups
Buffer Overflow in Seattle Lab Mail (SLmail) 5.5 - POP3
Updated
Apr 10, 2021
Python
Updated
Dec 23, 2019
JavaScript
Port of memtester to Android, with modifications to build a standalone binary using ndk-build. This is similar to memtest86 on x86 PCs which tests for RAM errors and memory corruption.
Git bisection utility wrapper script for memory corruption bugs.
Updated
Jul 16, 2020
Shell
A mock (awful) ctf built to practice binary exploitation
Improve this page
Add a description, image, and links to the
memory-corruption
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
memory-corruption
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.