| BigNerd95/Chimay-Red |
613 |
|
0 |
0 |
over 3 years ago |
0 |
|
23 |
|
Python |
| Working POC of Mikrotik exploit from Vault 7 CIA Leaks |
| CTurt/JuSt-ROP |
123 |
|
0 |
0 |
over 10 years ago |
0 |
|
0 |
|
JavaScript |
| JavaScript ROP framework |
| AN0NY420/PS4-4.0x--4.05-Code-Execution-PoC |
28 |
|
0 |
0 |
over 8 years ago |
0 |
|
0 |
|
JavaScript |
| 4.05 added support |
| yardenshafir/MitigationFlagsCliTool |
19 |
|
0 |
0 |
over 5 years ago |
0 |
|
0 |
|
C++ |
| advanced-threat-research/xbypass |
17 |
|
0 |
0 |
almost 7 years ago |
0 |
|
0 |
other |
Python |
| A tool to facilitate ROP Chain Development for XML Character Sanitization |
| salmanyam/jitrop-native |
12 |
|
0 |
0 |
almost 4 years ago |
0 |
|
0 |
|
HTML |
| The project collects the gadgets and records the time to obtain gadgets from a process by utilizing an attack technique called Just-In-Time Return-Oriented Programming (JIT-ROP). We utilize the JIT-ROP technique to evaluate different fine-grained address space layout randomization (ASLR) schemes and measure the upper bound of effective re-randomization intervals. Our evaluation and measurements have been published in ACM CCS 2020. We implement a native version of the JIT-ROP technique. |
| ejohn/rop-lang |
6 |
|
0 |
0 |
over 11 years ago |
0 |
|
0 |
other |
Python |
| abapat/ROPChain-Compiler |
5 |
|
0 |
0 |
over 9 years ago |
0 |
|
0 |
|
Python |
| A script to scan an ELF binary for gadgets and compile a ROP chain to give execute permissions to shellcode. |
| syncom/rop-on-arm-rpi3-tutorial |
5 |
|
0 |
0 |
over 3 years ago |
0 |
|
0 |
|
C |
| ARM (A32) Linux Return-oriented Programming with Raspberry Pi |
| jusmistic/BFS-Ekoparty-ctf-2019 |
5 |
|
0 |
0 |
almost 6 years ago |
0 |
|
0 |
|
Python |
| BFS Ekoparty 2019 Exploitation Challenge Exploit and writeup |