-
https://play.picoctf.org/practice/challenge/440
-
https://play.picoctf.org/practice/challenge/435
-
Use-after-free, double free and heap buffer overflows are mentioned as vulnerabilities, but not how to exploit them.
There are good explanations of heap exploiting techniques here: https://heap-exp…
-
```py
import socket
import time
import struct
# Setup Connection
def setup_connection(ip, port):
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
sock.connect((ip, port))
return s…
-
执行时报错
su9su updated
2 months ago
-
Review and add:
- https://github.com/google/security-research/blob/master/analysis/kernel/heap-exploitation/README.md
- https://lookerstudio.google.com/reporting/68b02863-4f5c-4d85-b3c1-992af89c855c…
-
Vulnerability Severity: Low
Impact of Exploitation: Unauthorized Access to Sensitive Information, Privacy Violation
File Name - Line Number
\coturn\src\apps\relay\dbdrivers\dbd_mysql.c - 46, 55
…
-
Currently, the [security comparison]( https://github.com/struct/isoalloc/blob/master/SECURITY_COMPARISON.MD ) document only lists security features, but it would be nice to list killed/mitigated/… bug…
-
Can Simple-AEG generate exploit for real applications ?
-
Sharing some early results from trying out vulnerability analysis and remediation for OSS-Fuzz bugs (see script [here](https://github.com/google/oss-fuzz-gen/blob/main/experimental/manual/oss_fuzz_vul…