Advanced buffer overflow and memory corruption security challenges
-
Updated
Feb 18, 2022 - C++
Advanced buffer overflow and memory corruption security challenges
Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard communication protocol for each service.
🗝 BotNet ( .NET ) Source Codes
Clang plugin which fills structure pads to provoke buffer overflow errors
CSE 4118 Cryptography and Security Lab
OpenU Course 20937 Work
A C++23 buffer type with compile-time checked slice/view/join operations
Avoid using unsafe functions in your C/C++ code.
A fixed-width string class for C++11
SecRetAddress is a GCC plugin to protect the return address override
A simple Heap-based Buffer Overflow(with RCE)-vulnerable application and POC for Windows.
This application sends random data through the serial port for a user defined time.
Compile-time-checked C++20 buffer.
This assignment presents code that collects a number from the user and then displays the number and a secret account number. Entering too many characters triggers the overwrite of the account number. Using the existing source code as a starting point, you need to prevent the user input from impacting the account number.
Simple crackme for my groupmate
The "BEX" (Buffer Overflow Exception) error typically occurs when a program tries to use more memory than allocated, often leading to application crashes. To fix this issue, download and run the provided software, which will help identify and fix the underlying memory-related problems, allowing your applications to run preventing future crashes.
Add a description, image, and links to the buffer-overflow topic page so that developers can more easily learn about it.
To associate your repository with the buffer-overflow topic, visit your repo's landing page and select "manage topics."