There are 1 repository under ret2libc topic.
Exploitation on ARM-based Systems (Troopers18)
Learn Binary Exploitation with sample problems and solutions
Generate arbitrary strings out of contents of ELF sections
My course work about basic binary exploitation.🤿
Hacking challenge to hone your skills in binary exploitation
using unique,system-independant methods to exploit binaries given on
Information security challenge, taking advantage of a vulnerable ISO and its systems to become root.
Information security project. This is a collection of ELF Binary exploits to expand your knowledge of security breaches, undefined behaviour and memory management.
ROP Gadget finding utility written in C
Buffer Overflow attacks on Linux
Solutions for some buffer overflow challenges
Successfully Completed a CTF challenge for computer security class
The Perfect Hack! - IEEE NITK Edify Workshop
Si Rainfall vous a paru facile, voila de quoi vous donner du fil a retordre. Override est la dernière ISO de challenge qui vous demandera de partir à la recherche de failles présents dans des binaires protégés, et reconstruire ces binaires en fonction de leur comportement.
Information security project. This is a collection of ELF binaries exploits to better understand how memory works.
Exploiting a C program using buffer overflow attack, by-passing ASLR by brute force and using ret2libc attack as a part of assignment for course System and Network Security