31 results for “topic:ret2libc”
Linux Binary Exploitation
Learn Binary Exploitation with sample problems and solutions
Exploitation on ARM-based Systems (Troopers18)
Generate arbitrary strings out of contents of ELF sections
My course work about basic binary exploitation.🤿
Hacking challenge to hone your skills in binary exploitation
PWN101. Step-by-step tutorials on some binary exploitation stack-based techniques.
Information security project. This is a collection of ELF Binary exploits to expand your knowledge of security breaches, undefined behaviour and memory management.
Binary exploitation challenges
Information security project. This is a collection of ELF binaries exploits to better understand how memory works.
Information security challenge, taking advantage of a vulnerable ISO and its systems to become root.
using unique,system-independant methods to exploit binaries given on
ROP Gadget finding utility written in C
Last project of the exploit branch
If you enjoy solving tough puzzles with pure skill, this project is for you! It’s like unlocking a treasure chest — using assembly and binary exploitation to crack each level. A challenge you won’t regret! 🔐
Structured binary exploitation & reverse engineering notes (GDB, Radare2, Ghidra, Cutter) covering BOF, ret2win, ROP & exploit development mindset — written in Hinglish.
Solutions for some buffer overflow challenges
Advanced Binary Attack CTF
The Perfect Hack! - IEEE NITK Edify Workshop
Override is a hands-on binary exploitation project focused on identifying and exploiting low-level vulnerabilities in C programs, while bypassing modern protections like Canary, RELRO, NX and PIE.
Repo des challenges d'exploitations de binaires du Workshop de HackUTT
Cybersecurity portfolio: Google certification labs, CTF challenges, TryHackMe writeups, ret2libc exploitation, incident response, and security audits
Boot2Root is a challenge about privilege escalation, which require finding multiple ways to become root on the given ISO
Successfully Completed a CTF challenge for computer security class
Si Rainfall vous a paru facile, voila de quoi vous donner du fil a retordre. Override est la dernière ISO de challenge qui vous demandera de partir à la recherche de failles présents dans des binaires protégés, et reconstruire ces binaires en fonction de leur comportement.
Buffer Overflow attacks on Linux
Override is last ISO that will have you search for faults present in the protected binaries, and re-build these binaries depending on their behavior
Write-ups des challs de pwn.
Exploiting a C program using buffer overflow attack, by-passing ASLR by brute force and using ret2libc attack as a part of assignment for course System and Network Security
This project is a CTF-style vulnerable virtual machine designed for hands-on penetration testing and cybersecurity training. Root the box by exploiting misconfigurations, weak credentials, and privilege escalation paths. Ideal for practicing ethical hacking skills in a controlled lab environment.