Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.
Analysis of the vulnerability
华中科技大学软件安全课程设计2019
Reasonable Overflow is a programming library that aims to prevent unreasonable numbers during an integer overflow, and maybe even stop integer overflows themselves. Written in many languages.
Denial-of-Service PoC | Writeup | Header with CLFS structures | Imhex pattern for .blf extension
Overcomes the integer overflow problem by using arrays to represent values, algorithm can compute HUGE Fibonacci sequences very fast, O(nk) time.
PWN101. Step-by-step tutorials on some binary exploitation stack-based techniques.
Information security project. This is a collection of ELF binaries exploits to better understand how memory works.
A C project made as a part of the Secure Programming with C course (UE18CS257C) course at PES University. The objective of the project was to display the effects of integer overflows in the C programm...
Solving https://adventofcode.com/2022/day/11
Golang package for integer arithmetic with overflow detection.
Vulnerable codes and their fix in C (Over & Underflows)
simple C projects from college course Intro to programming