Linux Binary Exploitation
-
Updated
Jun 15, 2021 - C
Linux Binary Exploitation
#RomHack21 raptor's party pack.
Performing an exploit of Format String Vulnerability to leak information. Given a C compiled vulnerable software, with the help of reverse engineering and debugging; the attack had to be conducted to obtain dumb and smart leak of information.
Some exercises from my System and Network Hacking course @ University of Pisa
42 Cybersec projects
Information security project. This is a collection of ELF Binary exploits to expand your knowledge of security breaches, undefined behaviour and memory management.
Information security project. This is a collection of ELF binaries exploits to better understand how memory works.
A CTF-like project about ELF32/64 binary exploitation & buffer overflows
Buffer Overflows, Format Strings, Return Over Pointers and Shellcode Execution Attacks
CTF on overflows and format strings attacks
Advanced Binary Attack CTF
advanced CTF on overflows and format strings attacks
Add a description, image, and links to the format-string-attack topic page so that developers can more easily learn about it.
To associate your repository with the format-string-attack topic, visit your repo's landing page and select "manage topics."