Skip to content
nPm Hacks

nPm

  • Home
  • Privacy Policy
YouTube Channel

Malware Development

Home » Malware Development

Reusable App Fuzzer for Simple Buffer Overflow Development

Posted by By nPm December 25, 2025Posted inCoding, Ethical Hacking, Hacking, Linux, Networking, Python, Security, Tutorial0 Shares
Started doing some buffer overflow exploit development. Hoping to better understand some of the exploits used when doing CTF's and such. Nothing fancy, 32 bit vulnerable apps (on Windows 10) to try and learn about the process. I wrote an app fuzzer in python that is pretty re-usable. Takes IP…
Read More

Recent Posts

  • Reusable App Fuzzer for Simple Buffer Overflow Development
  • Hack the Box Walkthrough – Bashed
  • Hack the Box Walkthrough – Nibbles
  • TryHackMe 2025 Advent of Cyber Day 5 Bonus Question #2
  • Offsec Proving Grounds Walkthrough – Pathway

Recent Comments

No comments to show.

Categories

  • About Me
  • Backups
  • Canonical
  • Certification Exams
  • Cisco
  • Coding
  • Concerto Digital Signage
  • Containers
  • Debian
  • Docker
  • Ethical Hacking
  • Hacking
  • Hostname
  • HTB
  • ISC2
  • java
  • Javascript
  • Linux
  • Logs
  • Metasploit
  • msfvenom
  • Networking
  • Node.js
  • Offsec
  • Python
  • Raspberry Pi
  • Review
  • Security
  • Snort
  • Systemd
  • TryHackMe
  • Tutorial
  • Ubuntu
  • Ubuntu Server
  • Virtual Machines
  • Virtualization
  • Walkthrough

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2023
  • October 2023
  • July 2023
  • ThreatsDay Bulletin: Stealth Loaders, AI Chatbot Flaws AI Exploits, Docker Hack, and 15 More Stories
  • LastPass 2022 Breach Led to Years-Long Cryptocurrency Thefts, TRM Labs Finds
  • Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability
  • CISA Flags Actively Exploited Digiever NVR Vulnerability Allowing Remote Code Execution
  • New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper
  • LinkedIn
  • GitHub
  • YouTube
Copyright 2025 — nPm Hacks. All rights reserved. Sinatra WordPress Theme
Scroll to Top