GitHub topics: format-string-attack
alanvivona/pwnshop
Exploit Development, Reverse Engineering & Cryptography
Language: Python - Size: 4.53 MB - Last synced at: 19 days ago - Pushed at: over 4 years ago - Stars: 250 - Forks: 47

pikulet/mem-attacks-example
Examples of Binary Exploitations - Buffer Overflow, Return-Oriented Programming and Format String
Language: Python - Size: 334 KB - Last synced at: 23 days ago - Pushed at: over 2 years ago - Stars: 8 - Forks: 1

152334H/pwnscripts 📦
Very simple script(s) to hasten binary exploit creation
Language: Python - Size: 1.22 MB - Last synced at: 12 days ago - Pushed at: almost 4 years ago - Stars: 92 - Forks: 7

0xdea/raptor_romhack21
#RomHack21 raptor's party pack.
Language: C - Size: 27.3 MB - Last synced at: 16 days ago - Pushed at: over 1 year ago - Stars: 7 - Forks: 1

rosehgal/BinExp
Linux Binary Exploitation
Language: C - Size: 298 KB - Last synced at: 9 months ago - Pushed at: almost 4 years ago - Stars: 1,286 - Forks: 210

pmihsan/Security-Attacks
Buffer Overflows, Format Strings, Return Over Pointers and Shellcode Execution Attacks
Language: C - Size: 40 KB - Last synced at: about 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

HugoKovac/Rainfall
CTF on overflows and format strings attacks
Language: C - Size: 53.7 KB - Last synced at: about 1 year ago - Pushed at: about 2 years ago - Stars: 0 - Forks: 0

HugoKovac/override
advanced CTF on overflows and format strings attacks
Language: C - Size: 16.6 KB - Last synced at: about 1 year ago - Pushed at: about 2 years ago - Stars: 0 - Forks: 0

gcosta0410/Y3S1-FSI-Fundamentos-de-Seguranca-Informatica 📦
Year: 3rd, Semester: 1st, Course: Fundamentos de Segurança Informática (FSI)
Size: 12.4 MB - Last synced at: about 1 month ago - Pushed at: about 1 year ago - Stars: 0 - Forks: 0

lovasoa/pyformat-challenge
Python format string vulnerability exploitation challenge
Language: Python - Size: 13.7 KB - Last synced at: 17 days ago - Pushed at: almost 4 years ago - Stars: 7 - Forks: 4

selfsigned/HackThePlanet
42 Cybersec projects
Language: C - Size: 480 KB - Last synced at: 12 months ago - Pushed at: over 2 years ago - Stars: 2 - Forks: 0

PinkP4nther/PSMCCLI_PoC
PSMCCLI PoC in Pinky's Palace V3 by https://twitter.com/ju256_
Language: Python - Size: 6.84 KB - Last synced at: over 1 year ago - Pushed at: almost 7 years ago - Stars: 1 - Forks: 2

arvindpj007/Format-String-Vulnerability-Angband
Performing an exploit of Format String Vulnerability to leak information. Given a C compiled vulnerable software, with the help of reverse engineering and debugging; the attack had to be conducted to obtain dumb and smart leak of information.
Language: C - Size: 42.1 MB - Last synced at: 9 months ago - Pushed at: about 5 years ago - Stars: 7 - Forks: 0

C-Chafik/override
Advanced Binary Attack CTF
Language: C - Size: 42 KB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 0 - Forks: 0

alecontuIT/format-string-attack
Python script that can be used to craft a string to perform a format string attack in a 32bit system.
Language: Python - Size: 306 KB - Last synced at: almost 2 years ago - Pushed at: about 2 years ago - Stars: 0 - Forks: 0

kibotrel/42-Rainfall 📦
Information security project. This is a collection of ELF binaries exploits to better understand how memory works.
Language: C - Size: 95.7 KB - Last synced at: about 2 years ago - Pushed at: almost 3 years ago - Stars: 0 - Forks: 1

kibotrel/42-Override 📦
Information security project. This is a collection of ELF Binary exploits to expand your knowledge of security breaches, undefined behaviour and memory management.
Language: C - Size: 62.5 KB - Last synced at: about 2 years ago - Pushed at: almost 3 years ago - Stars: 1 - Forks: 1

louisabricot/override
A CTF-like project about ELF32/64 binary exploitation & buffer overflows
Language: C - Size: 32.2 KB - Last synced at: about 2 years ago - Pushed at: about 3 years ago - Stars: 1 - Forks: 0

Billy1900/Homology-AND-CFG-Detection
华中科技大学软件安全课程设计2019
Language: Python - Size: 2.62 MB - Last synced at: about 2 years ago - Pushed at: over 5 years ago - Stars: 7 - Forks: 1

TheLeopardsH/Software_based_side_channel_attacks
Software based Side Channel attacks
Size: 7.81 KB - Last synced at: over 1 year ago - Pushed at: almost 5 years ago - Stars: 0 - Forks: 0

hannbyul/KSCTF
경기대학교 정보보안 동아리 K.knock 연습문제 모음
Language: Python - Size: 6.28 MB - Last synced at: almost 2 years ago - Pushed at: over 2 years ago - Stars: 0 - Forks: 0

loresuso/BinaryExploitation
Some exercises from my System and Network Hacking course @ University of Pisa
Language: C - Size: 41.1 MB - Last synced at: 9 days ago - Pushed at: over 4 years ago - Stars: 3 - Forks: 4

publicqi/one_fmt
Format string payload generator
Language: Python - Size: 44.9 KB - Last synced at: about 1 month ago - Pushed at: over 4 years ago - Stars: 5 - Forks: 0

limitedeternity/ExploitEducation
Notes and exploits
Language: Python - Size: 12.7 KB - Last synced at: about 1 month ago - Pushed at: over 4 years ago - Stars: 1 - Forks: 0

arvindpj007/Software-Vulnerability-Analysis
The repository links to the collection of repositories that performs various Software Vulnerability Analysis and Exploits using different tools and methods.
Size: 1000 Bytes - Last synced at: about 2 years ago - Pushed at: about 5 years ago - Stars: 3 - Forks: 0

ekohilas/pycon-au-2017
Decoding the Frustrations and Vulnerabilities of Modern Text Processing - PyCon AU 2017
Language: Jupyter Notebook - Size: 5.86 KB - Last synced at: about 2 years ago - Pushed at: over 7 years ago - Stars: 0 - Forks: 0
