blazeinfosec / aslrektLinks
ASLREKT is a proof of concept for an unfixed generic local ASLR bypass in Linux.
☆25Updated 5 years ago
Alternatives and similar repositories for aslrekt
Users that are interested in aslrekt are comparing it to the libraries listed below
Sorting:
- LKRG bypass methods☆72Updated 5 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 4 years ago
- ☆92Updated 7 years ago
- Routines for hunting down kernel structs.☆41Updated 13 years ago
- ☆36Updated 4 years ago
- ☆49Updated 7 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Updated 7 years ago
- Simulate afl-fuzz☆16Updated 6 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆50Updated 6 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆46Updated 3 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆74Updated 4 years ago
- Tasteless CTF 2019☆20Updated 5 years ago
- run AFL with pintool☆66Updated 5 years ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13Updated 6 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Updated 12 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Updated last year
- Patches to afl to fix bugs or add enhancements☆81Updated 5 years ago
- python library for dumping a linux process from memory☆34Updated 15 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 6 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆71Updated 8 years ago
- An interactive memory info for pwning / exploiting☆102Updated 2 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 7 years ago
- Writeups of CTF challenges I do☆13Updated 5 years ago
- lwipのバグを半自動検出くん。First introduced in 「2018年 暗号と情報セキュリティシンポジウム」(SCIS2018).☆14Updated 2 years ago
- z3 scripts and ctf challenge solutions.☆24Updated 2 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆79Updated 2 years ago
- ☆63Updated 6 years ago
- Materials from Fuzzing Bay Area meetups☆68Updated 5 years ago
- realtime cross-tool collaborative reverse engineering☆101Updated 2 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆113Updated 7 years ago