This is an implementation of an ACM research paper published by cybersecurity researchers at Carnegie Mellon University: https://dl.acm.org/doi/pdf/10.1145/2560217.2560219
The novel contribution here is that, as opposed to the original implementation, this one leverages modern binary analysis tooling like angr - a current staple in CTF competitions. Such a tool was not available at the time the paper was published in 2011.
For a working exploit, see overflow_examples/linux/README.md