CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule
-
Updated
Oct 26, 2020 - Lua
CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule
Red-team tool to hook libc read syscall with a buffer overflow vulnerability.
CVE-2020-16899 - Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule
These are the scripts & methodologies that can be used in Buffer Over Flow Fuzzing and Exploitation
openosc: Open Object Size Checking: Library to detect buffer overflows in C/C++ code
Research about Buffer Overflow Attack vulnerability.
An x86_64 Buffer Overflow Lab for UAF's Cyber Security Club
Buffer overflow exploitation to get root access from other users
Demonstration of some attacks exploiting security vulnerabilities of websites and OSs as tasks of Computer Security LAB, CSE 406 in Level-4, Term-1 of CSE, BUET
Vulnerable Webserver program for Exploitation. Exploits can be found in WEBSERVER_EXPLOIT repository.
Buffer Overflows, Format Strings, Return Over Pointers and Shellcode Execution Attacks
This is an assignment I completed as an undergraduate student in Technical University of Crete.
Challenge/Tutorial aiming to exploit the buffer overflow vulnerability w/ Metasploit plugin implementation
Add a description, image, and links to the buffer-overflow-vulnerability topic page so that developers can more easily learn about it.
To associate your repository with the buffer-overflow-vulnerability topic, visit your repo's landing page and select "manage topics."