Skip to content

Latest commit

 

History

History
18 lines (15 loc) · 682 Bytes

File metadata and controls

18 lines (15 loc) · 682 Bytes

Exploit-Demos

Demos and example code on how to write basic memory corruption exploits on Windows. The two examples here are a basic stack based overflow, and a Std Exception chain exploit.

Building Examples

Stack Based Overflow

This example is a simple note taking server which can be exploited to execute arbitrary code

Standard Exception Chain Exploit

This is a (working) text based adventure game which can be exploited to execute arbitrary code