A sandbox escape based on the proof-of-concept (CVE-2018-4087) by Rani Idan (Zimperium)
-
Updated
May 8, 2018 - JavaScript
8000
A sandbox escape based on the proof-of-concept (CVE-2018-4087) by Rani Idan (Zimperium)
My solution to the BFS Ekoparty Exploitation Challenge
A C-based Kernel / CPU side-channel exploit development library.
Basic implementation of a shadow stack in C language, for ROP and stack-based buffer overflow mitigation
dr.rer.oec.gadget IDAPython plugin for the Interactive Disassembler <ABANDONED PROJECT>
Stealthy x64 thread manipulation library for calling functions inside target processes without creating remote threads or installing hooks.
Some exercises from my System and Network Hacking course @ University of Pisa
Challenges and exams' solution from the Cybersecurity course
Advanced ROP Gadget Filtering & Chain Solver
Some notes to begin pwn properly
PWN101. Step-by-step tutorials on some binary exploitation stack-based techniques.
Claude Code plugin for binary exploitation (pwn) challenges on HackTheBox and CTFs
Scripts used for the Software systems exploitation course
Automatic ROPChain Generation
My solutions to ropemporium challenges
This repository contains dumped PS4 6.72 modules (webkit, libc, libkernel) required to build Sleirsgoevy's PS4JB2 from source. See 'Releases' to get the dumps (including extracted gadgets)
A testbed for RISCV vulnerable binaries that aims to produce meaningful fingerprints recognizable by a Control Flow integrity Machine Learning Algorithm.
Add a description, image, and links to the rop topic page so that developers can more easily learn about it.
To associate your repository with the rop topic, visit your repo's landing page and select "manage topics."