0xSoEasY / ROPemporiumLinks
All ROPemporium binaries categorized by architecture, with solving scripts and custom flags
☆23Updated 2 years ago
Alternatives and similar repositories for ROPemporium
Users that are interested in ROPemporium are comparing it to the libraries listed below
Sorting:
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆43Updated 2 years ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆66Updated last year
- Linux Kernel N-day Exploit/Analysis.☆65Updated 8 months ago
- Old and new CTFs about Linux kernel exploitation.☆55Updated 3 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- Repo for talk slides & materials☆19Updated 7 months ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆102Updated 4 months ago
- Binary exploitation by confusing the unwinder☆63Updated 2 years ago
- a new class of file structure attacks☆50Updated 2 years ago
- ☆46Updated last year
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago
- A tool for automating setup of kernel pwn challenges☆58Updated 3 weeks ago
- Linux & Android Kernel Vulnerability research and exploitation☆44Updated last year
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆60Updated last year
- Damn Vulenerable Kernel Module for kernel fuzzing☆62Updated 8 months ago
- ☆71Updated last year
- A collection of my weggli patterns to facilitate vulnerability research.☆138Updated last month
- CTF pwn problem writeup☆39Updated 2 years ago
- Find command injection and format string bugs in binaries☆15Updated last year
- Toolkit to turn Chromium vulnerabilities into full-chain exploits☆120Updated last week
- Blogpost about optimizing binary-only fuzzing with AFL++☆65Updated last year
- Use-After-Free in Netfilter nf_tables when processing batch requests CVE-2023-32233☆50Updated 2 years ago
- ☆178Updated 4 months ago
- Leveraging patch diffing to discover new vulnerabilities☆124Updated 8 months ago
- Proof-of-Concept of exploits that may be published☆21Updated 8 months ago
- ☆38Updated last year
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆61Updated last month
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 3 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago