// BAF – BUFFER OVERFLOW AUTOMATION FRAMEWORK
#PYTHON
#X86
#ROP CHAINS
#WINDBG
#FUZZING
A custom exploitation tool written in Python to automate the detection and exploitation of x86 stack-based buffer overflows. This framework was developed at age 15, establishing my foundation in low-level memory corruption.
Operational Capabilities
- Automated Fuzzing: Scripted a modular fuzzer to identify crash offsets and discover “bad characters” in remote targets automatically.
- Payload Generation: Streamlined the construction of ROP (Return Oriented Programming) chains and shellcode injection to bypass non-executable stack protections.
- Targeted Analysis: Utilized
WinDbgandMona.pyintegration to automate the search for viable “Jump” instructions (e.g.,JMP ESP) across loaded modules.
Impact
BAF was a pivot point in my research, moving from manual exploitation to programmatic vulnerability analysis. It successfully automated the “oscp-style” overflow process, reducing a multi-hour manual task to a matter of minutes.