x86 and ARM Buffer Overflow and ROP Exploits - Assignment 2 for Systems Security and Malicious Code Analysis Course
-
Updated
Oct 28, 2020 - Python
x86 and ARM Buffer Overflow and ROP Exploits - Assignment 2 for Systems Security and Malicious Code Analysis Course
FTP server in the PS3 browser. Not ready for public use.
Software based Side Channel attacks
using unique,system-independant methods to exploit binaries given on
32-bit and 64-bit solutions and walkthroughs to the ROP Emporium
ROP and JOP gadget finder tool with GUI
This repository contains exploits to Windows binaries provided by Exploit2 course by opensecuritytraining.
ROP-Tool HTTP Server
A python module to facilitate in the generation of rop string for ARM and MIPS .
My collection of self-written exploits
This is the source of our Return Oriented Programming tool.
Red-team tool to hook libc read syscall with a buffer overflow vulnerability.
Exploitation on different architectures (x86, x64, arm, mips, avr)
ROP gadget finder and analysis in pure Javascript
Return Oriented Programme Evolution with ROPER
Automatic ROPChain Generation
Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)
PegaSwitch is an exploit toolkit for the Nintendo Switch
This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC, MIPS, RISC-V 64, and RISC-V Compressed architectures.
Add a description, image, and links to the rop-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the rop-exploitation topic, visit your repo's landing page and select "manage topics."