CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule
-
Updated
Oct 26, 2020 - Lua
CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule
Red-team tool to hook libc read syscall with a buffer overflow vulnerability.
CVE-2020-16899 - Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule
These are the scripts & methodologies that can be used in Buffer Over Flow Fuzzing and Exploitation
openosc: Open Object Size Checking: Library to detect buffer overflows in C/C code
Research about Buffer Overflow Attack vulnerability.
An x86_64 Buffer Overflow Lab for UAF's Cyber Security Club
Vulnerable Webserver program for Exploitation. Exploits can be found in WEBSERVER_EXPLOIT repository.
Demonstration of some attacks exploiting security vulnerabilities of websites and OSs as tasks of Computer Security LAB, CSE 406 in Level-4, Term-1 of CSE, BUET
Buffer overflow exploitation to get root access from other users
Buffer Overflows, Format Strings, Return Over Pointers and Shellcode Execution Attacks
This is an assignment I completed as an undergraduate student in Technical University of Crete.
Challenge/Tutorial aiming to exploit the buffer overflow vulnerability w/ Metasploit plugin implementation
Add a description, image, and links to the buffer-overflow-vulnerability topic page so that developers can more easily learn about it.
To associate your repository with the buffer-overflow-vulnerability topic, visit your repo's landing page and select "manage topics."