A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
- Updated
May 7, 2023 - C
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes
Watchdog is a minimal and thread safe C library for tracking memory allocations, reallocations, and frees to detect memory leaks, buffer overflows, and double frees.
Vulnerable codes and their fix in C (Over & Underflows)
Libft is a project at Codam where I rebuild some core C functions from scratch — the same ones the standard library gives you. Later on, I’ll use this collection as the foundation for bigger, more advanced programs.
Binary Exploitation CTF
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes
Add a description, image, and links to the heap-overflow topic page so that developers can more easily learn about it.
To associate your repository with the heap-overflow topic, visit your repo's landing page and select "manage topics."