Educational demonstration of resource exhaustion attacks through browser tab spawning. For academic study only.
- WARNING: Misuse may cause system instability
- Never deploy against unauthorized systems
- C# Implementation: Windows-compatible resource stress test
- Controlled Environment Tool:
// Sample attack vector for(int i=0; i<1000; i++) { Process.Start("chrome.exe", "https://example.com"); } - RAM Consumption Monitoring: Track memory usage patterns
- Educational Focus: Demonstrates buffer overflow principles
- Clone repository:
git clone https://github.com/irhdab/BufferoverflowVirus_browser.git - Open
BufferOverflowVirus.slnin Visual Studio - Build in Debug mode only
# Controlled execution example
BufferoverflowVirus.exe --url https://localhost --tabs 50
Approved Use Cases
✅ Computer security coursework
✅ Memory management demonstrations
✅ Ethical hacking exercises
Prohibited Use Cases
❌ Real-world attacks
❌ Unauthorized testing
❌ Production environments
| Risk Factor | Mitigation Strategy |
|---|---|
| System Crash | Use VM snapshots |
| Data Loss | Isolate test environment |
| Browser Damage | Use disposable profiles |
BufferoverflowVirus_browser/
├── BufferOverflowVirus/ # C# project
│ ├── Program.cs # Attack logic
│ └── BrowserHelper.cs # Tab spawning
├── BufferOverflowVirus.sln # Solution
└── SECURITY.md # Ethical guidelines