Overstuffed buffers and the curious claws that find them¶
Here’s where things get messy—in the best possible way. These training grounds are dedicated to the chaotic elegance of buffer overflows: pushing past memory limits, hijacking execution flow, and poking around where polite code would not dare. Much like a raccoon that ignores size constraints to wedge itself into an overflowing compost heap, force your way in, take control, and rummage through the guts of vulnerable systems.
Like a raccoon squeezing into a bin that’s clearly too small—sometimes it spills over spectacularly.
- The raccoon dives into virtual bins and finds real exploits
- Rooting around in memory with mischievous intent
- ELF x86: Stack buffer overflow basic 1
- ELF x64: Basic heap overflow
- ELF x86: Stack buffer overflow basic 2
- ELF x86: Format string bug basic 1
- ELF x64: Stack buffer overflow basic
- ELF x86: Format string bug basic 2
- ELF x86: Race condition
- ELF ARM: Stack buffer overflow basic
- ELF x86: Stack buffer overflow basic 3
- ELF x86: Use after free basic
- ELF x86: BSS buffer overflow
- ELF x86: Stack buffer overflow basic 4
- ELF x86: Stack buffer overflow basic 6
- ELF x86: Format string bug basic 3
- ELF ARM: Basic ROP
- ELF x86: Stack buffer overflow C++ vtables
- ELF x86: Stack buffer overflow basic 5
- ELF x86: Remote format string bug
Last update:
2025-05-12 14:16