A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
-
Updated
May 7, 2023 - C
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes
Bellek taşmalarını öğrenin (🇹🇷 Türkçe bir kaynak)
Watchdog is a minimal and thread safe C library for tracking memory allocations, reallocations, and frees to detect memory leaks, buffer overflows, and double frees.
Vulnerable codes and their fix in C (Over & Underflows)
Binary Exploitation CTF
Workspace for binary exploitation cool and fun challanges with solutions
Libft is a project at Codam where I rebuild some core C functions from scratch — the same ones the standard library gives you. Later on, I’ll use this collection as the foundation for bigger, more advanced programs.
A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
Add a description, image, and links to the heap-overflow topic page so that developers can more easily learn about it.
To associate your repository with the heap-overflow topic, visit your repo's landing page and select "manage topics."