Advanced buffer overflow and memory corruption security challenges
-
Updated
Feb 18, 2022 - C++
Advanced buffer overflow and memory corruption security challenges
Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard communication protocol for each service.
Clang plugin which fills structure pads to provoke buffer overflow errors
CSE 4118 Cryptography and Security Lab
Avoid using unsafe functions in your C/C++ code.
OpenU Course 20937 Work
SecRetAddress is a GCC plugin to protect the return address override
A C++23 buffer type with compile-time checked slice/view/join operations
A fixed-width string class for C++11
This application sends random data through the serial port for a user defined time.
Simple crackme for my groupmate
Compile-time-checked C++20 buffer.
This assignment presents code that collects a number from the user and then displays the number and a secret account number. Entering too many characters triggers the overwrite of the account number. Using the existing source code as a starting point, you need to prevent the user input from impacting the account number.
Code to Demonstrate Buffer Overflow Vulnerability in Simple Authentication Apps
Add a description, image, and links to the buffer-overflow topic page so that developers can more easily learn about it.
To associate your repository with the buffer-overflow topic, visit your repo's landing page and select "manage topics."