0xSoEasY / ROPemporiumLinks
All ROPemporium binaries categorized by architecture, with solving scripts and custom flags
☆23Updated 2 years ago
Alternatives and similar repositories for ROPemporium
Users that are interested in ROPemporium are comparing it to the libraries listed below
Sorting:
- Linux Kernel N-day Exploit/Analysis.☆67Updated 11 months ago
- Simple script to find kernel objects of a certain size in the Linux kernel☆110Updated 2 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Updated 8 months ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- ☆128Updated 11 months ago
- ☆93Updated 2 years ago
- Old and new CTFs about Linux kernel exploitation.☆60Updated 3 years ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆64Updated 11 months ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆61Updated 2 years ago
- Files used for reproducing Fuzzware's experiments☆60Updated 2 years ago
- Binary exploitation by confusing the unwinder☆65Updated 2 years ago
- ☆70Updated 2 years ago
- PASTIS: Collaborative Fuzzing Framework☆162Updated last week
- ☆100Updated 3 years ago
- A tool for automating setup of kernel pwn challenges☆60Updated 4 months ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆120Updated last year
- Use-After-Free in Netfilter nf_tables when processing batch requests CVE-2023-32233☆51Updated 2 years ago
- A collection of my weggli patterns to facilitate vulnerability research.☆145Updated 3 weeks ago
- ☆49Updated 3 years ago
- ☆133Updated this week
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- ASLR bypass without infoleak☆160Updated 3 years ago
- Blogpost about optimizing binary-only fuzzing with AFL++☆68Updated 2 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- Leveraging patch diffing to discover new vulnerabilities☆136Updated 11 months ago
- Documentation for Vilo router vulnerability research☆15Updated 11 months ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆194Updated last year
- Target components for kAFL/Nyx Fuzzer☆33Updated 2 months ago
- The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses.☆34Updated 4 years ago
- weggli ruleset scanner for source code and binaries☆32Updated last month