47 results for “topic:return-oriented-programming”
rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.
ROPfuscator is a fine-grained code obfuscation framework for C/C++ programs using ROP (return-oriented programming).
ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Syscalls attack, a novel Heaven's Gate, and "shellcodeless" ROP. The framework utilizes emulation and obfuscation to help expand the attack surface.
991CN X 反编译及资料整理
Very simple script(s) to hasten binary exploit creation
Borrowed Instructions Synthetic Computation
Windows kernel ROP-only implant exposing R/W primitives
ROP Benchmark is a tool to compare ROP compilers
A tool for synthesizing code-reuse attacks (aka ROP) from a reference program, powered by logical modeling of Ghidra's `p-code` IL.
Stack Based buffer overflow attack
Finding and classifying ROP gadgets from rp++ output file with some regex and a CLI.
buffer overflow exploits for simple c programs (64 bit)
This is the source of our Return Oriented Programming tool.
ARM (A32) Linux Return-oriented Programming with Raspberry Pi
Examples of Binary Exploitations - Buffer Overflow, Return-Oriented Programming and Format String
My course work about basic binary exploitation.🤿
Taking return oriented programming a bit too literally
Backtesting Algo-Trading Strategies, FinTech Analysis & Portfolio Optimization: NVDA, AMD, INTC, MSI vs S&P 500 Benchmark
No description provided.
Windows Exploit development : Bypass Data Execution Prevention (DEP) using ROP chains manually hard code
Simple bash script to filter out useful ROP gadgets from rp++ output while bypassing DEP
An unsafe brainfuck interpreter. It uses stack as memory directly.
基本 ROB 的 EXP 及其 binary 程序
PWN101. Step-by-step tutorials on some binary exploitation stack-based techniques.
Some notes to begin pwn properly
All CTFs solved in Offensive and Defensive Cyber Security course of Polytechnic of Milan 23/24 edition
Tesi magistrale di Ingegneria Informatica Magistrale su Attacchi Buffer Overflow e Return Oriented Programming in architetture RISC-V, Università di Bologna
Binary Ninja plugin to find ROP gadgets in MIPS
memory exploits
Final Project - CS155 (Computer Science I)