Basic Requirements for exploits   In here shows you how to identify a buffer overflow vulnerability and how to develop a buffer overflow exploit using Python and Ruby scripts within a Kali Linux attack VM.   Also use olly-dbg for debugging of the vulnserver executable. The victim VM will be a,   Windows 7 Professional 32-bit VM with vulnserver installed. Vulnserver is a windows-based multi-threaded TCP server that is intentionally vulnerable to buffer overflow. we're going to be exploiting the TRUN command in Vulnserver in order to a reverse shell with netcat.   In “Windows 7 Professional 32-bit VM” please make sure that the Windows Firewall is turned off and that your attack and victim VMs are able to ping one another. >>  GitHub Link >>   YouTube Link  
First you will need nasm installed on your machine to compile it. sudo apt-get install nasm Write the below assembly code in an editor and save as shell.asm To   compile it use the following commands $nasm -f elf -o shell.o shell.asm and $ld -o shell shell.o To address this issue we can use the following commands $nasm -f elf64 -o shell.o shell.asm and $ld -m elf_x86_64 -s -o shell shell.o Now run it with:  ./shell