Showing 21 open source projects for "buffer overflow attack"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 1
    fmt

    fmt

    Formatting library as an alternative to C stdio and C++ iostreams

    ...The format API is similar in spirit to the C printf family of function but is safer, simpler and several times faster than common standard library implementations. The format string syntax is similar to the one used by str.format in Python. The library is fully type safe, automatic memory management prevents buffer overflow, errors in format strings are reported using exceptions or at compile time. The library produces compact per-call compiled code. The library is highly portable and relies only on a small set of C++11 features, like variadic templates, type traits, rvalue references, decltype, trailing return, types, deleted functions, alias templates. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    LINKERD

    LINKERD

    Ultralight, security-first service mesh for Kubernetes

    Enterprise power without enterprise complexity. Linkerd adds security, observability, and reliability to any Kubernetes cluster. 100% open source, CNCF graduated, and written in Rust. Instantly add latency-aware load balancing, request retries, timeouts, and blue-green deploys to keep your applications resilient. Incredibly small and blazing fast Linkerd2-proxy micro-proxy written in Rust for security and performance. Self-contained control plane, incrementally deployable data plane, and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    cerberuscms2

    cerberuscms2

    Cerberus Content Management System

    Cerberus Content Management System is a dynamic, secure and infinitely expandable CMS designed after a Unix-Like model. It is a custom written Web Application Framework ( W.A.F. ) with a consistent and custom written Pre-Hyper-Text-Post-Processor Programming Code Framework ( P.C.F. ). This Web Application Software Project' aim is to be the fastest and most secure Web Application Framework, Web Application Programming Code Framework, Text, Voice and Video Communications Platform and Content...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Cerberus Content Management System 6

    Cerberus Content Management System 6

    Cerberus Content Management System

    Cerberus Content Management System is a dynamic, secure and infinitely expandable CMS designed after a Unix-Like model complete with a Unix-Like Kernel File named: Cerberus. It is a custom written Web Application Framework ( W.A.F. ) with a consistent and custom written Pre-Hyper-Text-Post-Processor Programming Code Framework ( P.C.F. ). This Web Application Software Project' aim is to be the fastest and most secure Web Application Framework, Web Application Programming Code Framework, Text,...
    Downloads: 1 This Week
    Last Update:
    See Project
  • DAT Freight and Analytics - DAT Icon
    DAT Freight and Analytics - DAT

    DAT Freight and Analytics operates DAT One truckload freight marketplace

    DAT Freight & Analytics operates DAT One, North America’s largest truckload freight marketplace; DAT iQ, the industry’s leading freight data analytics service; and Trucker Tools, the leader in load visibility. Shippers, transportation brokers, carriers, news organizations, and industry analysts rely on DAT for market trends and data insights, informed by nearly 700,000 daily load posts and a database exceeding $1 trillion in freight market transactions. Founded in 1978, DAT is a business unit of Roper Technologies (Nasdaq: ROP), a constituent of the Nasdaq 100, S&P 500, and Fortune 1000. Headquartered in Beaverton, Ore., DAT continues to set the standard for innovation in the trucking and logistics industry.
    Learn More
  • 5
    CerberusCMS5

    CerberusCMS5

    Cerberus Content Management System

    Cerberus Content Management System is a dynamic, secure and infinitely expandable CMS designed after a Unix-Like model. It is a custom written Web Application Framework ( W.A.F. ) with a consistent and custom written Pre-Hyper-Text-Post-Processor Programming Code Framework ( P.C.F. ). This Web Application Software Project' aim is to be the fastest and most secure Web Application Framework, Web Application Programming Code Framework, Text, Voice and Video Communications Platform and Content...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    HackSys Extreme Vulnerable Driver

    HackSys Extreme Vulnerable Driver

    HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux

    The HackSys Extreme Vulnerable Driver (HEVD) is a Windows Kernel driver that is intentionally vulnerable. It has been developed for security researchers and enthusiasts to improve their skills in kernel-level exploitation. HEVD offers a range of vulnerabilities, from simple stack buffer overflows to more complex issues such as use-after-free, pool buffer overflows, and race conditions. This allows researchers to explore exploitation techniques for each implemented vulnerability.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 7
    test-tlb

    test-tlb

    Stupid memory latency and TLB tester

    test-tlb is a tiny C microbenchmark that explores the performance characteristics of memory access patterns with respect to the CPU’s Translation Lookaside Buffer (TLB) and caches. It walks arrays using different strides and working-set sizes so you can observe when access patterns overflow cache or TLB capacity. By timing tight loops and varying parameters, the program reveals step-changes in latency that map to cache lines, page sizes, and TLB coverage. It is intentionally minimal so you can modify page sizes, strides, or pointer-chasing strategies to run experiments on different machines and kernels. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Windows DOS Alarm

    Windows DOS Alarm

    Set an audible alarm or google voice sms for incomming DDOS attack

    Prior to updated 06/13/16 12:57AM alarm.exe was not working on all computers! The location of the sms.ini file was also fixed. New GPLv3. Introduction: Buffer overflows are impossible to manage with an automated system, so set an alarm! lol Set an audible alarm for the windows desktop manager that signals incoming Denial of Service by way of the gmetad daemon. You must have ganglia installed. To demonstrate the gmetad deamon telnet to port 8649 of the host you want to monitor....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    bWAPP

    an extremely buggy web app !

    bWAPP, or a buggy web application, is a free and open source deliberately insecure web application. bWAPP helps security enthusiasts, developers and students to discover and to prevent web vulnerabilities. bWAPP prepares one to conduct successful penetration testing and ethical hacking projects. What makes bWAPP so unique? Well, it has over 100 web bugs! It covers all major known web vulnerabilities, including all risks from the OWASP Top 10 project. The focus is not just on one specific...
    Leader badge
    Downloads: 2,157 This Week
    Last Update:
    See Project
  • All-in-one security tool helps you prevent ransomware and breaches. Icon
    All-in-one security tool helps you prevent ransomware and breaches.

    SIEM + Detection and Response for IT Teams

    Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.
    Learn More
  • 10

    utf8_printf()

    printf() family of functions for printing from UTF32 to UTF8 strings

    Fully re-implemented from scratch and an original work, this UTF-8 encoder does not rely on the traditional method of range switching in various algorithms but has just one functional while loop to build the string. Built around this encoder are 6 utf8-printf() functions that allow printing a standard UTF32 - UNIX 32 bit wide character (wchar_t) string to stdout, a string, or a file as a UTF-8 encoded string.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    String object manipulation library for C language - Objet de gestion de chaînes de caractères pour le langage C
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Levvitron Firewall/IPS

    Levvitron Firewall/IPS

    Secure your presence in cyberspace with Levvitron

    Levvitron provides one of a kind protection against hackers and network attacks. Its features include: Anti-port-scanning ability HTTPS traffic analyzer Deep packet inspector Anti-botnet capability Network buffer overflow protection Anti-OS fingerprinting protection
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Implementation of a buffer overflow attack on a Linux kernel (version 2.4.21)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Memory_Handler

    A simple memory overseer using overloaded versions of new and delete

    To integrate the memory debugger into the program simply include the cpp and .h to your project and include the .h into any relevant files. In the event of a leak the proper symbols are generated, the ptr address, modbase, file name, line number, and stack address are presented in “leaks.log” for every leak. In the event of a heap bug a break point is enabled at the offending area.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Stack Flowers is a program that create pattern at the buffer, calculate pattern offset, write pattern buffer into specific variable name & programming language. Used for stack overflow exploit development.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    An alternative to the string library for C and C++ which is more functional and does not have buffer overflow problems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    A tool to be used for newly created OSS web firewall/proxy/servers. Submit (GET/POST/HEAD) user-defined packets to web firewall to test its security strength. Tell you at which packet length a firewall will crash. Good for Heap/buffer overflow hunting.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Nedgty is an application level web services firewall that runs on Linux to protect against SOAP and non-SOAP specific threats. The current prototype protects against XDoS, DoS, Buffer Overflow and provides IP Authorization.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    QuantumDruid is a web server designed from the ground up with security and provability. It aims to be mathematically proven to be secure, and already has a proof which shows that it is invulnerable to buffer overflow attacks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    boef

    Buffer Overflow Exploitation Framework

    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    Hardware Memory Checker

    Hardware Memory Checker

    ...It uses the memory paging system to allocate a guard page after each page of memory to provide a hardware boundary that can detect memory overflows. This allows for immediate detection of buffer overflow error conditions. There are many other memory checker programs in existence - why do we need another? This Hardware Memory Checker provides a combination of features not found in other memory checkers. - it uses the hardware paging system for immediate error detection (most other memory checkers look for modified memory in no mans land) - it is very fast compared to other hardware memory checkers because it makes fewer changes to the paging tables - it can track the original release location when debugging duplicate free problems - it is designed for large scale integration with the ability to call user defined fail functions
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next