Exploitation on different architectures (x86, x64, arm, mips, avr)
-
Updated
Oct 23, 2018 - C
Exploitation on different architectures (x86, x64, arm, mips, avr)
Red-team tool to hook libc read syscall with a buffer overflow vulnerability.
This repository contains exploits to Windows binaries provided by Exploit2 course by opensecuritytraining.
FTP server in the PS3 browser. Not ready for public use.
Return Oriented Programme Evolution with ROPER
A python module to facilitate in the generation of rop string for ARM and MIPS .
32-bit and 64-bit solutions and walkthroughs to the ROP Emporium
This is the source of our Return Oriented Programming tool.
Automatic ROPChain Generation
using unique,system-independant methods to exploit binaries given on
Software based Side Channel attacks
x86 and ARM Buffer Overflow and ROP Exploits - Assignment 2 for Systems Security and Malicious Code Analysis Course
ROP and JOP gadget finder tool with GUI
PegaSwitch is an exploit toolkit for the Nintendo Switch
My collection of self-written exploits
ROP gadget finder and analysis in pure Javascript
ROP-Tool HTTP Server
Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)
This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC, MIPS, RISC-V 64, and RISC-V Compressed architectures.
Add a description, image, and links to the rop-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the rop-exploitation topic, visit your repo's landing page and select "manage topics."