GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.
-
Updated
Aug 4, 2022 - Python
GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.
These are CTF writeups (Pwn & Reverse Engineering)
PicoCTF Write-ups......
A Collection of Writeups for Binary Exploitation CTF Problems
This repo contains scripts & documentation for buffer overflow exploit development and windows executable(Vulnserver).
Return-oriented programming (ROP)
Binary Exploitation Challenges Solving and a lot of Binaries Exploitation Challenge i came across through out time
Tips & Tricks on Binary Exploitation & Reverse Engineering
Write up of solutions to the picoCTF 2023 capture the flag (CTF) event from my submissions during the competition.
I will upload any writeups that I complete for rop emporium
PicoCTF-Writeup: A collection of solutions and writeups for PicoCTF challenges, documenting problem-solving steps and techniques.
Add a description, image, and links to the binaryexploitation topic page so that developers can more easily learn about it.
To associate your repository with the binaryexploitation topic, visit your repo's landing page and select "manage topics."