Skip to content

KevinYang21/Vulnerability-Exploitation

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Vulnerability-Exploitation

memory overflows

These exploit experiments exploited a few well-known vulnerabilities and gained root privilege as result.

web server

Reverse engineered a web server using IDA pro and explored its vulnerabilities. Sploit1 bypassed DEP and successfully gained root access. Sploit2 bypassed ASLR and successfully gained root access.

website

a, b, c, d, e exploits/accomplishes, respectively, Cookie Theft, CSRF, SQL injection, Password Theft and XSS.

About

Target and exploit programs

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published