Buffer Overflows
Last updated
Was this helpful?
Last updated
Was this helpful?
[VulnServer] https://github.com/stephenbradshaw/vulnserver/
[An Introduction to Fuzzing: Using SPIKE to find vulnerabilities in Vulnserver]β― http://thegreycorner.com/2010/12/introduction-to-fuzzing-using-spike-to.html
[Exploit Writers Debugging Tutorial] http://thegreycorner.com/2011/03/exploit-writers-debugging-tutorial.html
[Simple Stack Based Buffer Overflow Tutorial for Vulnserver]β― http://thegreycorner.com/2011/03/simple-stack-based-buffer-overflow.html
[SEH Based Buffer Overflow Tutorial for Vulnserver] http://thegreycorner.com/2011/06/seh-based-buffer-overflow-tutorial-for.html
[Egghunter based exploit for Vulnserver] http://thegreycorner.com/2011/10/egghunter-based-exploit-for-vulnserver.html
[Restricted Character Set Buffer Overflow Tutorial for Vulnserver] http://thegreycorner.com/2011/12/restricted-character-set-buffer.html
[Omlette Egghunter Shellcode http://thegreycorner.com/2013/10/omlette-egghunter-shellcode.html
[Buffer Overflow Guide OSCP Basics ] https://assassinukg.github.io/bufferoverflow/bufferoverflow-vulnserver/
[GitHub: Buffer Overflow Attacks] https://github.com/johnjhacking/Buffer-Overflow-Guide
[Stack Based Buffer Overflows Part 1] https://memn0ps.github.io/2020/01/25/Stack-Based-Buffer-Overflows-Part-1.html
[Buffer Overflow tutorial (Part 1)] https://medium.com/dev-genius/buffer-overflow-tutorial-part1
[ joshua17sc / Buffer-Overflows ] https://github.com/joshua17sc/Buffer-Overflows
[An Introduction to Fuzzing: Using fuzzers (SPIKE) to find vulnerabilities] https://resources.infosecinstitute.com/topic/intro-to-fuzzing/
[PWK/OSCP β Stack Buffer Overflow Practice] https://www.vortex.id.au/2017/05/pwkoscp-stack-buffer-overflow-practice/
[ justinsteven / dostackbufferoverflowgood ] https://github.com/justinsteven/dostackbufferoverflowgood
[Demo Time! - WAR-FTP v1.65] https://www.notion.so/Demo-Time-WAR-FTP-v1-65-626628a7a3ca46b0b157e18d30862831
[Binary Exploitation - Buffer Overflow Explained in Detail] https://0xrick.github.io/binary-exploitation/bof1/ *β― https://veteransec.com/2018/09/10/32-bit-windows-buffer-overflows-made-easy/