Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

naivenom/exploiting

Repository files navigation

Linux Exploit Development - Level 0

Buffer Overflow & Format String Solution
Protostar - Exploit Exercises Stack1
Protostar - Exploit Exercises Format0
Protostar - Exploit Exercises Stack2
Protostar - Exploit Exercises Format1
Protostar - Exploit Exercises Stack3
Protostar - Exploit Exercises Format2
Protostar - Exploit Exercises Stack4
Protostar - Exploit Exercises Format3
Protostar - Exploit Exercises Stack5
Protostar - Exploit Exercises Format4
Protostar - Exploit Exercises Stack6
CSAW CTF 2015: precision Exploit
Angstrom CTF 2016: overflow2, shellcode Buffer Exploit, Shellcode Exploit
3DS CTF 2016: get_started, not_the_same Get Started Exploit, Not the same Exploit
Pico CTF 2013: format1 Exploit

Linux Exploit Development - ctf

Name Level, Description, Solution
Tokyo Westerns/MMA CTF 2nd 2016: greeting Baby, Format String + Overwrite GOT and .fini_array section, Video, Exploit
DEF CON CTF Qualifier 2016: xkcd Baby, Heartbleed, Video, Exploit
DEF CON CTF Qualifier 2015: babyecho Baby, Format string + leak memory address + bypass ASLR, Exploit
CSAW CTF Qualification Round 2013: Exploitation 200 Baby, Shellcode + leak self-implementation canary, Exploit
EBCTF 2013: PWN 200 Brainfuck Baby, ++ pointer + Underflow to get system function, Exploit
X-MAS CTF 2019: Sn0wverfl0w Easy, ret2libc with leak, Binary

Windows Exploit Development - Exercises from CLS Exploits

Name Level, Description, Solution
Level 1b Baby, Buffer Overflow overwriting random value with bypass jl condition, Solve
Level 2 Baby, Buffer Overflow overwriting a cte value and bypass check because of strcpy, Solve
Level 3 Baby, Buffer Overflow overwriting a cte value and bypass check because of strcpy (Part 2), Solve
Level 4 Baby, Bypass check with strcpy and overflow, Solve
Level 5 Baby, Heap allocation and bypass Anti-Debugging, Solve
Level 6 Baby, Overflow for using strcat string concatenate + flag decision, Solve
Level 7 Baby, Overwrite RET with memory address to win

AltStyle によって変換されたページ (->オリジナル) /