logo
Defence blues
Buffer overflows
  • Red tradecraft
  • Privacy greenhouse
  • Purple crossroads
  • Indigo observatory
  • Contact
Initializing search
    • Blue team @Purpleteaming
      • In the beginning …
      • Middle ground
        • Persistence
        • Buffer overflows
          • Buffer overflow notes
          • Buffer overflow runbooks
        • Buffer overflows
          • Buffer overflow notes
          • Buffer overflow runbooks
        • Reverse engineering
        • Steganography
        • Cryptanalysis
        • Evasion
      • End of story
    • Blue team @SOC
    • Blue team for dev
    • Blue team @Home
    • Bulletproofing servers
    • Golem Trust Computing Ltd.
    • Department of Silent Stability
    • The Home for Bewildered Beasts of Legend
    • Stormforge training grounds
    • Honeytech for humans

    Buffer overflows¶

    Memory corruption bugs remain relevant in 2026, not as the most common attack vector, but as the decisive one when everything else fails. This section works on what defenders can do about it.

    Mitigations and detection.

    • Buffer overflow notes
      • Memory corruption mitigations
      • Detecting memory corruption exploitation
    • Buffer overflow runbooks
      • Crash triage
      • Memory forensics for exploit investigation
    2026-05-07 09:40
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7