buffer-overflow topic
pwnshop
Exploit Development, Reverse Engineering & Cryptography
Zeratool
Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems
zenith
Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.
AdvancedMemoryChallenges
Advanced buffer overflow and memory corruption security challenges
CVE-2020-16898
CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP/IP Vulnerability Detection Logic and Rule
yookiterm-slides
Exploitation and Mitigation Slides
BMJ
Code snippets for bare-metal malware development
buffer-overflow-vulnerability-services-tester-tool
Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard communication protocol for each service.
CVE-2019-10999
Full exploit for D-Link DCS-5020L, POC crash for others that are vulnerable as well.