The Wayback Machine - https://web.archive.org/web/20211015225658/https://github.com/topics/format-string-attack
Here are
15 public repositories
matching this topic...
Linux Binary Exploitation
Exploit Development, Reverse Engineering & Cryptography
Updated
Aug 27, 2020
Python
Very simple script(s) to hasten binary exploit creation
Updated
May 27, 2021
Python
Performing an exploit of Format String Vulnerability to leak information. Given a C compiled vulnerable software, with the help of reverse engineering and debugging; the attack had to be conducted to obtain dumb and smart leak of information.
Python format string vulnerability exploitation challenge
Updated
May 19, 2021
Python
Format string payload generator
Updated
Oct 7, 2020
Python
Updated
Oct 10, 2019
Python
The repository links to the collection of repositories that performs various Software Vulnerability Analysis and Exploits using different tools and methods.
Some exercises from my System and Network Hacking course @ University of Pisa
#RomHack21 raptor's party pack
Updated
May 24, 2018
Python
Examples of Binary Exploitations - Buffer Overflow, Return-Oriented Programming and Format String
Updated
Sep 3, 2021
Python
Decoding the Frustrations and Vulnerabilities of Modern Text Processing - PyCon AU 2017
Updated
Dec 8, 2017
Jupyter Notebook
Software based Side Channel attacks
Updated
Dec 10, 2020
Python
Improve this page
Add a description, image, and links to the
format-string-attack
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
format-string-attack
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.