Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.
-
Updated
Apr 25, 2022 - Python
Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.
Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stage during the Pwn2Own Miami 2022 competition.
Writeups of some of the Binary Exploitation challenges that I have solved during CTF.
All things Binary Exploitation, Memory, Assembly and Corruptions.
Buffer Overflow in Seattle Lab Mail (SLmail) 5.5 - POP3
Add a description, image, and links to the memory-corruption topic page so that developers can more easily learn about it.
To associate your repository with the memory-corruption topic, visit your repo's landing page and select "manage topics."