https://github.com/gemesa/exploit-lab
Lab designed to analyze memory vulnerabilities
https://github.com/gemesa/exploit-lab
buffer-overflow exploit-development memory-exploits
Last synced: 7 months ago
JSON representation
Lab designed to analyze memory vulnerabilities
- Host: GitHub
- URL: https://github.com/gemesa/exploit-lab
- Owner: gemesa
- License: apache-2.0
- Created: 2025-06-29T08:10:07.000Z (9 months ago)
- Default Branch: main
- Last Pushed: 2025-06-29T08:46:20.000Z (9 months ago)
- Last Synced: 2025-07-12T05:22:53.492Z (9 months ago)
- Topics: buffer-overflow, exploit-development, memory-exploits
- Language: Python
- Homepage:
- Size: 7.81 KB
- Stars: 0
- Watchers: 0
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Introduction
exploit-lab is about analyzing memory vulnerabilities.
# Repository structure
## [buffer-overflow](./buffer-overflow/)
A proof of concept for a buffer overflow with the goal of executing shellcode.
It is documented in detail on my blog:
- https://shadowshell.io/shattering-the-stack-0
- https://shadowshell.io/shattering-the-stack-1
- https://shadowshell.io/shattering-the-stack-2
# How to build
## Prerequisites
```
$ dnf search *aarch64*
$ sudo dnf install gcc-aarch64-linux-gnu
$ sudo dnf install binutils-aarch64-linux-gnu
$ sudo dnf install sysroot-aarch64-fc41-glibc
```
## x64
```
$ make x64
```
## ARM64
```
$ make arm64
```