logo
Defence blues
Buffer overflows
  • Red wilds
  • Privacy greenhouse
  • Purple crossroads
  • Indigo observatory
  • Contact
Initializing search
    • Golem Trust Computing Ltd.
    • Department of Silent Stability
    • The Home for Bewildered Beasts of Legend
    • Stormforge training grounds
    • Honeytech for humans
    • Blue team @Purpleteaming
      • In the beginning …
      • Middle ground
        • Persistence
        • Buffer overflows
          • Buffer overflow notes
          • Buffer overflow runbooks
        • Buffer overflows
          • Buffer overflow notes
          • Buffer overflow runbooks
        • Reverse engineering
        • Steganography
        • Cryptanalysis
        • Evasion
      • End of story
    • Blue team @SOC
    • Blue team for dev
    • Blue team @Home
    • Bulletproofing servers

    Buffer overflows¶

    Memory corruption bugs remain relevant in 2026, not as the most common attack vector, but as the decisive one when everything else fails. This section works on what defenders can do about it.

    Mitigations and detection.

    • Buffer overflow notes
      • Memory corruption mitigations
      • Detecting memory corruption exploitation
    • Buffer overflow runbooks
      • Crash triage
      • Memory forensics for exploit investigation
    2026-03-25 20:00
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7