Showing 21 open source projects for "buffer overflow attack"

View related business solutions
  • Rezku Point of Sale Icon
    Rezku Point of Sale

    Designed for Real-World Restaurant Operations

    Rezku is an all-inclusive ordering platform and management solution for all types of restaurant and bar concepts. You can now get a fully custom branded downloadable smartphone ordering app for your restaurant exclusively from Rezku.
    Learn More
  • Loan management software that makes it easy. Icon
    Loan management software that makes it easy.

    Ideal for lending professionals who are looking for a feature rich loan management system

    Bryt Software is ideal for lending professionals who are looking for a feature rich loan management system that is intuitive and easy to use. We are 100% cloud-based, software as a service. We believe in providing our customers with fair and honest pricing. Our monthly fees are based on your number of users and we have a minimal implementation charge.
    Learn More
  • 1
    fmt

    fmt

    Formatting library as an alternative to C stdio and C++ iostreams

    ...The format API is similar in spirit to the C printf family of function but is safer, simpler and several times faster than common standard library implementations. The format string syntax is similar to the one used by str.format in Python. The library is fully type safe, automatic memory management prevents buffer overflow, errors in format strings are reported using exceptions or at compile time. The library produces compact per-call compiled code. The library is highly portable and relies only on a small set of C++11 features, like variadic templates, type traits, rvalue references, decltype, trailing return, types, deleted functions, alias templates. ...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 2
    LINKERD

    LINKERD

    Ultralight, security-first service mesh for Kubernetes

    Enterprise power without enterprise complexity. Linkerd adds security, observability, and reliability to any Kubernetes cluster. 100% open source, CNCF graduated, and written in Rust. Instantly add latency-aware load balancing, request retries, timeouts, and blue-green deploys to keep your applications resilient. Incredibly small and blazing fast Linkerd2-proxy micro-proxy written in Rust for security and performance. Self-contained control plane, incrementally deployable data plane, and...
    Downloads: 13 This Week
    Last Update:
    See Project
  • 3
    CerberusCMS5

    CerberusCMS5

    Cerberus Content Management System

    Cerberus Content Management System is a dynamic, secure and infinitely expandable CMS designed after a Unix-Like model. It is a custom written Web Application Framework ( W.A.F. ) with a consistent and custom written Pre-Hyper-Text-Post-Processor Programming Code Framework ( P.C.F. ). This Web Application Software Project' aim is to be the fastest and most secure Web Application Framework, Web Application Programming Code Framework, Text, Voice and Video Communications Platform and Content...
    Downloads: 24 This Week
    Last Update:
    See Project
  • 4
    Cerberus Content Management System 6

    Cerberus Content Management System 6

    Cerberus Content Management System

    Cerberus Content Management System is a dynamic, secure and infinitely expandable CMS designed after a Unix-Like model complete with a Unix-Like Kernel File named: Cerberus. It is a custom written Web Application Framework ( W.A.F. ) with a consistent and custom written Pre-Hyper-Text-Post-Processor Programming Code Framework ( P.C.F. ). This Web Application Software Project' aim is to be the fastest and most secure Web Application Framework, Web Application Programming Code Framework, Text,...
    Downloads: 34 This Week
    Last Update:
    See Project
  • MicroStation by Bentley Systems is the trusted computer-aided design (CAD) software built specifically for infrastructure design. Icon
    MicroStation by Bentley Systems is the trusted computer-aided design (CAD) software built specifically for infrastructure design.

    Microstation enables architects, engineers, and designers to create precise 2D and 3D drawings that bring complex projects to life.

    MicroStation is the only computer-aided design software for infrastructure design, helping architects and engineers like you bring their vision to life, present their designs to their clients, and deliver their projects to the community.
    Learn More
  • 5
    cerberuscms2

    cerberuscms2

    Cerberus Content Management System

    Cerberus Content Management System is a dynamic, secure and infinitely expandable CMS designed after a Unix-Like model. It is a custom written Web Application Framework ( W.A.F. ) with a consistent and custom written Pre-Hyper-Text-Post-Processor Programming Code Framework ( P.C.F. ). This Web Application Software Project' aim is to be the fastest and most secure Web Application Framework, Web Application Programming Code Framework, Text, Voice and Video Communications Platform and Content...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    HackSys Extreme Vulnerable Driver

    HackSys Extreme Vulnerable Driver

    HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux

    The HackSys Extreme Vulnerable Driver (HEVD) is a Windows Kernel driver that is intentionally vulnerable. It has been developed for security researchers and enthusiasts to improve their skills in kernel-level exploitation. HEVD offers a range of vulnerabilities, from simple stack buffer overflows to more complex issues such as use-after-free, pool buffer overflows, and race conditions. This allows researchers to explore exploitation techniques for each implemented vulnerability.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    test-tlb

    test-tlb

    Stupid memory latency and TLB tester

    test-tlb is a tiny C microbenchmark that explores the performance characteristics of memory access patterns with respect to the CPU’s Translation Lookaside Buffer (TLB) and caches. It walks arrays using different strides and working-set sizes so you can observe when access patterns overflow cache or TLB capacity. By timing tight loops and varying parameters, the program reveals step-changes in latency that map to cache lines, page sizes, and TLB coverage. It is intentionally minimal so you can modify page sizes, strides, or pointer-chasing strategies to run experiments on different machines and kernels. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Windows DOS Alarm

    Windows DOS Alarm

    Set an audible alarm or google voice sms for incomming DDOS attack

    Prior to updated 06/13/16 12:57AM alarm.exe was not working on all computers! The location of the sms.ini file was also fixed. New GPLv3. Introduction: Buffer overflows are impossible to manage with an automated system, so set an alarm! lol Set an audible alarm for the windows desktop manager that signals incoming Denial of Service by way of the gmetad daemon. You must have ganglia installed. To demonstrate the gmetad deamon telnet to port 8649 of the host you want to monitor....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    bWAPP

    an extremely buggy web app !

    bWAPP, or a buggy web application, is a free and open source deliberately insecure web application. bWAPP helps security enthusiasts, developers and students to discover and to prevent web vulnerabilities. bWAPP prepares one to conduct successful penetration testing and ethical hacking projects. What makes bWAPP so unique? Well, it has over 100 web bugs! It covers all major known web vulnerabilities, including all risks from the OWASP Top 10 project. The focus is not just on one specific...
    Leader badge
    Downloads: 1,621 This Week
    Last Update:
    See Project
  • Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight Icon
    Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight

    Lock Down Any Resource, Anywhere, Anytime

    CLEAR by Quantum Knight is a FIPS-140-3 validated encryption SDK engineered for enterprises requiring top-tier security. Offering robust post-quantum cryptography, CLEAR secures files, streaming media, databases, and networks with ease across over 30 modern platforms. Its compact design, smaller than a single smartphone image, ensures maximum efficiency and low energy consumption.
    Learn More
  • 10

    utf8_printf()

    printf() family of functions for printing from UTF32 to UTF8 strings

    Fully re-implemented from scratch and an original work, this UTF-8 encoder does not rely on the traditional method of range switching in various algorithms but has just one functional while loop to build the string. Built around this encoder are 6 utf8-printf() functions that allow printing a standard UTF32 - UNIX 32 bit wide character (wchar_t) string to stdout, a string, or a file as a UTF-8 encoded string.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    String object manipulation library for C language - Objet de gestion de chaînes de caractères pour le langage C
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Levvitron Firewall/IPS

    Levvitron Firewall/IPS

    Secure your presence in cyberspace with Levvitron

    Levvitron provides one of a kind protection against hackers and network attacks. Its features include: Anti-port-scanning ability HTTPS traffic analyzer Deep packet inspector Anti-botnet capability Network buffer overflow protection Anti-OS fingerprinting protection
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    Implementation of a buffer overflow attack on a Linux kernel (version 2.4.21)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Memory_Handler

    A simple memory overseer using overloaded versions of new and delete

    To integrate the memory debugger into the program simply include the cpp and .h to your project and include the .h into any relevant files. In the event of a leak the proper symbols are generated, the ptr address, modbase, file name, line number, and stack address are presented in “leaks.log” for every leak. In the event of a heap bug a break point is enabled at the offending area.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Stack Flowers is a program that create pattern at the buffer, calculate pattern offset, write pattern buffer into specific variable name & programming language. Used for stack overflow exploit development.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    An alternative to the string library for C and C++ which is more functional and does not have buffer overflow problems.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 17
    A tool to be used for newly created OSS web firewall/proxy/servers. Submit (GET/POST/HEAD) user-defined packets to web firewall to test its security strength. Tell you at which packet length a firewall will crash. Good for Heap/buffer overflow hunting.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Nedgty is an application level web services firewall that runs on Linux to protect against SOAP and non-SOAP specific threats. The current prototype protects against XDoS, DoS, Buffer Overflow and provides IP Authorization.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    QuantumDruid is a web server designed from the ground up with security and provability. It aims to be mathematically proven to be secure, and already has a proof which shows that it is invulnerable to buffer overflow attacks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    boef

    Buffer Overflow Exploitation Framework

    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    Hardware Memory Checker

    Hardware Memory Checker

    ...It uses the memory paging system to allocate a guard page after each page of memory to provide a hardware boundary that can detect memory overflows. This allows for immediate detection of buffer overflow error conditions. There are many other memory checker programs in existence - why do we need another? This Hardware Memory Checker provides a combination of features not found in other memory checkers. - it uses the hardware paging system for immediate error detection (most other memory checkers look for modified memory in no mans land) - it is very fast compared to other hardware memory checkers because it makes fewer changes to the paging tables - it can track the original release location when debugging duplicate free problems - it is designed for large scale integration with the ability to call user defined fail functions
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB