Showing 18 open source projects for "buffer overflow attack"

View related business solutions
  • AestheticsPro Medical Spa Software Icon
    AestheticsPro Medical Spa Software

    Our new software release will dramatically improve your medspa business performance while enhancing the customer experience

    AestheticsPro is the most complete Aesthetics Software on the market today. HIPAA Cloud Compliant with electronic charting, integrated POS, targeted marketing and results driven reporting; AestheticsPro delivers the tools you need to manage your medical spa business. It is our mission To Provide an All-in-One Cutting Edge Software to the Aesthetics Industry.
    Learn More
  • Award-Winning Medical Office Software Designed for Your Specialty Icon
    Award-Winning Medical Office Software Designed for Your Specialty

    Succeed and scale your practice with cloud-based, data-backed, AI-powered healthcare software.

    RXNT is an ambulatory healthcare technology pioneer that empowers medical practices and healthcare organizations to succeed and scale through innovative, data-backed, AI-powered software.
    Learn More
  • 1
    fmt

    fmt

    Formatting library as an alternative to C stdio and C++ iostreams

    ...The format API is similar in spirit to the C printf family of function but is safer, simpler and several times faster than common standard library implementations. The format string syntax is similar to the one used by str.format in Python. The library is fully type safe, automatic memory management prevents buffer overflow, errors in format strings are reported using exceptions or at compile time. The library produces compact per-call compiled code. The library is highly portable and relies only on a small set of C++11 features, like variadic templates, type traits, rvalue references, decltype, trailing return, types, deleted functions, alias templates. ...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 2
    LINKERD

    LINKERD

    Ultralight, security-first service mesh for Kubernetes

    Enterprise power without enterprise complexity. Linkerd adds security, observability, and reliability to any Kubernetes cluster. 100% open source, CNCF graduated, and written in Rust. Instantly add latency-aware load balancing, request retries, timeouts, and blue-green deploys to keep your applications resilient. Incredibly small and blazing fast Linkerd2-proxy micro-proxy written in Rust for security and performance. Self-contained control plane, incrementally deployable data plane, and...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    cerberuscms2

    cerberuscms2

    Cerberus Content Management System

    Cerberus Content Management System is a dynamic, secure and infinitely expandable CMS designed after a Unix-Like model. It is a custom written Web Application Framework ( W.A.F. ) with a consistent and custom written Pre-Hyper-Text-Post-Processor Programming Code Framework ( P.C.F. ). This Web Application Software Project' aim is to be the fastest and most secure Web Application Framework, Web Application Programming Code Framework, Text, Voice and Video Communications Platform and Content...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Cerberus Content Management System 6

    Cerberus Content Management System 6

    Cerberus Content Management System

    Cerberus Content Management System is a dynamic, secure and infinitely expandable CMS designed after a Unix-Like model complete with a Unix-Like Kernel File named: Cerberus. It is a custom written Web Application Framework ( W.A.F. ) with a consistent and custom written Pre-Hyper-Text-Post-Processor Programming Code Framework ( P.C.F. ). This Web Application Software Project' aim is to be the fastest and most secure Web Application Framework, Web Application Programming Code Framework, Text,...
    Downloads: 7 This Week
    Last Update:
    See Project
  • The Most Powerful Software Platform for EHSQ and ESG Management Icon
    The Most Powerful Software Platform for EHSQ and ESG Management

    Addresses the needs of small businesses and large global organizations with thousands of users in multiple locations.

    Choose from a complete set of software solutions across EHSQ that address all aspects of top performing Environmental, Health and Safety, and Quality management programs.
    Learn More
  • 5
    CerberusCMS5

    CerberusCMS5

    Cerberus Content Management System

    Cerberus Content Management System is a dynamic, secure and infinitely expandable CMS designed after a Unix-Like model. It is a custom written Web Application Framework ( W.A.F. ) with a consistent and custom written Pre-Hyper-Text-Post-Processor Programming Code Framework ( P.C.F. ). This Web Application Software Project' aim is to be the fastest and most secure Web Application Framework, Web Application Programming Code Framework, Text, Voice and Video Communications Platform and Content...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6
    HackSys Extreme Vulnerable Driver

    HackSys Extreme Vulnerable Driver

    HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux

    The HackSys Extreme Vulnerable Driver (HEVD) is a Windows Kernel driver that is intentionally vulnerable. It has been developed for security researchers and enthusiasts to improve their skills in kernel-level exploitation. HEVD offers a range of vulnerabilities, from simple stack buffer overflows to more complex issues such as use-after-free, pool buffer overflows, and race conditions. This allows researchers to explore exploitation techniques for each implemented vulnerability.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    test-tlb

    test-tlb

    Stupid memory latency and TLB tester

    test-tlb is a tiny C microbenchmark that explores the performance characteristics of memory access patterns with respect to the CPU’s Translation Lookaside Buffer (TLB) and caches. It walks arrays using different strides and working-set sizes so you can observe when access patterns overflow cache or TLB capacity. By timing tight loops and varying parameters, the program reveals step-changes in latency that map to cache lines, page sizes, and TLB coverage. It is intentionally minimal so you can modify page sizes, strides, or pointer-chasing strategies to run experiments on different machines and kernels. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Windows DOS Alarm

    Windows DOS Alarm

    Set an audible alarm or google voice sms for incomming DDOS attack

    Prior to updated 06/13/16 12:57AM alarm.exe was not working on all computers! The location of the sms.ini file was also fixed. New GPLv3. Introduction: Buffer overflows are impossible to manage with an automated system, so set an alarm! lol Set an audible alarm for the windows desktop manager that signals incoming Denial of Service by way of the gmetad daemon. You must have ganglia installed. To demonstrate the gmetad deamon telnet to port 8649 of the host you want to monitor....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    bWAPP

    an extremely buggy web app !

    bWAPP, or a buggy web application, is a free and open source deliberately insecure web application. bWAPP helps security enthusiasts, developers and students to discover and to prevent web vulnerabilities. bWAPP prepares one to conduct successful penetration testing and ethical hacking projects. What makes bWAPP so unique? Well, it has over 100 web bugs! It covers all major known web vulnerabilities, including all risks from the OWASP Top 10 project. The focus is not just on one specific...
    Leader badge
    Downloads: 1,632 This Week
    Last Update:
    See Project
  • Skillfully - The future of skills based hiring Icon
    Skillfully - The future of skills based hiring

    Realistic Workplace Simulations that Show Applicant Skills in Action

    Skillfully transforms hiring through AI-powered skill simulations that show you how candidates actually perform before you hire them. Our platform helps companies cut through AI-generated resumes and rehearsed interviews by validating real capabilities in action. Through dynamic job specific simulations and skill-based assessments, companies like Bloomberg and McKinsey have cut screening time by 50% while dramatically improving hire quality.
    Learn More
  • 10
    String object manipulation library for C language - Objet de gestion de chaînes de caractères pour le langage C
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Levvitron Firewall/IPS

    Levvitron Firewall/IPS

    Secure your presence in cyberspace with Levvitron

    Levvitron provides one of a kind protection against hackers and network attacks. Its features include: Anti-port-scanning ability HTTPS traffic analyzer Deep packet inspector Anti-botnet capability Network buffer overflow protection Anti-OS fingerprinting protection
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Implementation of a buffer overflow attack on a Linux kernel (version 2.4.21)
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13

    Memory_Handler

    A simple memory overseer using overloaded versions of new and delete

    To integrate the memory debugger into the program simply include the cpp and .h to your project and include the .h into any relevant files. In the event of a leak the proper symbols are generated, the ptr address, modbase, file name, line number, and stack address are presented in “leaks.log” for every leak. In the event of a heap bug a break point is enabled at the offending area.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Stack Flowers is a program that create pattern at the buffer, calculate pattern offset, write pattern buffer into specific variable name & programming language. Used for stack overflow exploit development.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    An alternative to the string library for C and C++ which is more functional and does not have buffer overflow problems.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    A tool to be used for newly created OSS web firewall/proxy/servers. Submit (GET/POST/HEAD) user-defined packets to web firewall to test its security strength. Tell you at which packet length a firewall will crash. Good for Heap/buffer overflow hunting.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Nedgty is an application level web services firewall that runs on Linux to protect against SOAP and non-SOAP specific threats. The current prototype protects against XDoS, DoS, Buffer Overflow and provides IP Authorization.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Hardware Memory Checker

    Hardware Memory Checker

    ...It uses the memory paging system to allocate a guard page after each page of memory to provide a hardware boundary that can detect memory overflows. This allows for immediate detection of buffer overflow error conditions. There are many other memory checker programs in existence - why do we need another? This Hardware Memory Checker provides a combination of features not found in other memory checkers. - it uses the hardware paging system for immediate error detection (most other memory checkers look for modified memory in no mans land) - it is very fast compared to other hardware memory checkers because it makes fewer changes to the paging tables - it can track the original release location when debugging duplicate free problems - it is designed for large scale integration with the ability to call user defined fail functions
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB