juergh / ret2usrLinks
Sample code for ret2usr (and ret2dir) kernel attacks
☆10Updated 9 years ago
Alternatives and similar repositories for ret2usr
Users that are interested in ret2usr are comparing it to the libraries listed below
Sorting:
- ☆96Updated 6 years ago
- ☆37Updated 4 years ago
- ☆56Updated 3 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Updated 6 years ago
- ☆53Updated 6 years ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆63Updated 8 years ago
- ☆55Updated 5 years ago
- Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints☆127Updated 5 years ago
- PathArmor context-sensitive CFI implementation☆45Updated 10 years ago
- A collection of user-space Linux kernel specific guided fuzzers based on LKL☆84Updated 7 months ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- Recover mutation graph from an AFL seed☆59Updated 5 years ago
- Public release of the tools used to assist in gadget finding.☆42Updated 7 years ago
- A Linux Kernel Module that implements a fast snapshot mechanism for fuzzing.☆139Updated 4 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆103Updated 6 years ago
- Bug hunting through fuzzer/*-sanitizer/etc...☆133Updated 5 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆159Updated 4 years ago
- ☆74Updated 6 years ago
- ☆65Updated 4 years ago
- Modular And Compositional analysis with KLEE Engine☆117Updated 6 years ago
- ☆64Updated 6 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆48Updated 8 years ago
- FuZZan: Efficient Sanitizer Metadata Design for Fuzzing☆124Updated 4 years ago
- ☆52Updated 4 years ago
- INACTIVE - http://mzl.la/ghe-archive - A Python3 bridge for implementing custom libFuzzer mutators☆74Updated 6 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆114Updated 7 years ago
- run AFL with pintool☆66Updated 5 years ago
- Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow☆55Updated 9 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆75Updated 4 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆77Updated 3 years ago