blazeinfosec / aslrektLinks
ASLREKT is a proof of concept for an unfixed generic local ASLR bypass in Linux.
☆26Updated 5 years ago
Alternatives and similar repositories for aslrekt
Users that are interested in aslrekt are comparing it to the libraries listed below
Sorting:
- LKRG bypass methods☆73Updated 6 years ago
- ☆92Updated 8 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆75Updated 4 years ago
- ☆37Updated 4 years ago
- Tasteless CTF 2019☆20Updated 6 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Updated 7 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Updated 7 years ago
- ☆49Updated 7 years ago
- My MS thesis on survey of a decade fo Linux Kernel CVEs, their categories and various mitigations that exist.☆159Updated 7 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆46Updated 3 years ago
- Write ups of solution for CTF challenges I solved☆25Updated 4 years ago
- ☆26Updated 7 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Updated 7 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆81Updated 3 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆114Updated 7 years ago
- Code samples used for the blog post☆24Updated 9 years ago
- Routines for hunting down kernel structs.☆41Updated 14 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 6 years ago
- python library for dumping a linux process from memory☆34Updated 15 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Updated 6 years ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13Updated 6 years ago
- Simulate afl-fuzz☆16Updated 6 years ago
- ☆64Updated 6 years ago
- Attacking the Core associated source files☆89Updated 8 years ago
- Backwards program slice stitching for automatic CTF problem solving.☆50Updated 6 years ago
- ☆100Updated 7 years ago
- A fuzzing framework for network servers☆121Updated 7 years ago
- 3D Accelerated Exploitation☆53Updated 6 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 12 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆45Updated 2 years ago