GitHub / Priyabug / Server-Side-Buffer-Overflow-Exploitation
Buffer overflow is a critical security vulnerability that occurs when a program writes more data into a buffer than it can handle, leading to memory corruption. Attackers can exploit this flaw to execute arbitrary code, modify program behavior, or escalate privileges, making it a severe risk in server
JSON API: http://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Priyabug%2FServer-Side-Buffer-Overflow-Exploitation
PURL: pkg:github/Priyabug/Server-Side-Buffer-Overflow-Exploitation
Stars: 0
Forks: 0
Open issues: 0
License: None
Language: Python
Size: 9.9 MB
Dependencies parsed at: Pending
Created at: 6 months ago
Updated at: 2 months ago
Pushed at: 2 months ago
Last synced at: 2 months ago
Topics: address-randomization, bash, buffer-overflow, buffer-overflow-attack, buffer-overflow-exploit, countermeasures, docker-compose, malicious-bad-file, python, server-side, shell-code, shell-scripting, vulnerabilities