juergh / ret2usrLinks
Sample code for ret2usr (and ret2dir) kernel attacks
☆9Updated 8 years ago
Alternatives and similar repositories for ret2usr
Users that are interested in ret2usr are comparing it to the libraries listed below
Sorting:
- ☆96Updated 6 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆63Updated 5 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆112Updated 7 years ago
- Public release of the tools used to assist in gadget finding.☆42Updated 7 years ago
- ☆55Updated 5 years ago
- A collection of user-space Linux kernel specific guided fuzzers based on LKL☆80Updated last month
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆59Updated 8 years ago
- ☆55Updated 2 years ago
- ☆53Updated 6 years ago
- ☆65Updated 4 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆101Updated 5 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow☆55Updated 9 years ago
- DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.☆94Updated 7 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆25Updated 7 years ago
- ☆72Updated 5 years ago
- Implementation of G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries☆95Updated 6 years ago
- A clang analyzer checker that looks for kernel uninitialized memory disclosures to userland.☆59Updated 6 years ago
- Source code for building an exploitable linux kernel challenge iso.☆46Updated 11 years ago
- ☆36Updated 4 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆125Updated 5 years ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆77Updated 5 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 6 years ago
- My KVM breakout code from my DEFCON/Black Hat 2011 presentation☆35Updated 11 years ago
- Security Evaluation of Dynamic Binary Instrumentation Engines☆80Updated 6 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆155Updated 4 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 9 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- ☆51Updated 7 years ago
- run AFL with pintool☆66Updated 5 years ago