Software based Side Channel attacks
-
Updated
Jul 19, 2020
Software based Side Channel attacks
32-bit and 64-bit solutions and walkthroughs to the ROP Emporium
x86 and ARM Buffer Overflow and ROP Exploits - Assignment 2 for Systems Security and Malicious Code Analysis Course
using unique,system-independant methods to exploit binaries given on
A python module to facilitate in the generation of rop string for ARM and MIPS .
This repository contains exploits to Windows binaries provided by Exploit2 course by opensecuritytraining.
ROP and JOP gadget finder tool with GUI
ROP-Tool HTTP Server
FTP server in the PS3 browser. Not ready for public use.
This is the source of our Return Oriented Programming tool.
My collection of self-written exploits
ROP gadget finder and analysis in pure Javascript
Red-team tool to hook libc read syscall with a buffer overflow vulnerability.
Exploitation on different architectures (x86, x64, arm, mips, avr)
Return Oriented Programme Evolution with ROPER
Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)
Automatic ROPChain Generation
PegaSwitch is an exploit toolkit for the Nintendo Switch
This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC, MIPS, RISC-V 64, and RISC-V Compressed architectures.
Add a description, image, and links to the rop-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the rop-exploitation topic, visit your repo's landing page and select "manage topics."