27 results for “topic:aslr”
Multi-arch docker image with ffmpeg/ffprobe binaries built as hardened static PIE binaries with no external dependencies
Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)
Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.
Moved: https://codeberg.org/koutheir/binary-security-check
Red-team tool to hook libc read syscall with a buffer overflow vulnerability.
The project collects the gadgets and records the time to obtain gadgets from a process by utilizing an attack technique called Just-In-Time Return-Oriented Programming (JIT-ROP). We utilize the JIT-ROP technique to evaluate different fine-grained address space layout randomization (ASLR) schemes and measure the upper bound of effective re-randomization intervals. Our evaluation and measurements have been published in ACM CCS 2020. We implement a native version of the JIT-ROP technique.
ASLR Disabler (x86 / x64) - Little utility for disabling the ASLR on PE files
File Capability Extractor
Dynamic loading with privilege separation
Check various security hardening features on ELF, PE and Mach-O binaries
libc_database python wrapper for exploit automation
Run program without ASLR (supports Linux and macOS)
Repo code for the related post on SecSI Blog: https://secsi.io/blog/blueborne-kill-chain-on-dockerized-android
LD_PRELOADed library to randomize malloc and friends.
collection of articles of random topics for private research purposes
Shell script to launch a Bash instance, from which all child processes will have ASLR disabled
My assignments on GDB and Computer Architecture; Buffer Overflow; Stack Overflow and ROP gadgets; ASLR; Heap Overflow; Type Confusion; Injection Attack; Fuzzing.
ROF - Raw Overflow Forge 🔥 An all-in-one ROP exploitation engine that automates binary analysis, gadget extraction, and payload generation. Perfect for CTF challenges, security research, and learning return-oriented programming techniques.
A simple Heap-based Buffer Overflow(with RCE)-vulnerable application and POC for Windows.
Goal of the Competition The goal of this competition is to detect and translate American Sign Language (ASL) fingerspelling into text. You will create a model trained on the largest dataset of its kind, released specifically for this competition.
Check to ASLR from Windows x86 EXE file and disable it.
Linux hardening best practices with Docker, automated patching, ASLR, AppArmor, and continuous security monitoring
Buffer Overflow attacks on Linux
A module for CMake to enable various mitigations implemented in compilers
Examining overflow exploits in C programs, and the various protection mechanisms that tries to prevent them.
Deep dives into ASLR and stack overflow vulnerabilities.
This lab required the execution of a buffer-overflow attack variant, known as return-to-libc, bypassing existing protection schemes implemented in Linux OS.