juergh / ret2usrLinks
Sample code for ret2usr (and ret2dir) kernel attacks
☆9Updated 8 years ago
Alternatives and similar repositories for ret2usr
Users that are interested in ret2usr are comparing it to the libraries listed below
Sorting:
- ☆96Updated 6 years ago
- Belluminar 2016 Beijing stuff☆26Updated 9 years ago
- This repository contains several tools to perform Prefetch Side-Channel Attacks☆59Updated 8 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆20Updated 5 years ago
- ☆17Updated 6 years ago
- HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators☆36Updated 3 years ago
- 2019 Advent Calendar, vmware pwnables☆50Updated 4 years ago
- Recover mutation graph from an AFL seed☆59Updated 4 years ago
- ☆64Updated 4 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆63Updated 5 years ago
- ROP Benchmark is a tool to compare ROP compilers☆42Updated 2 years ago
- ☆53Updated 6 years ago
- ☆36Updated 6 years ago
- Linux kernels (CGC DECREE and vanilla) with S2E extensions☆24Updated 11 months ago
- Public release of the tools used to assist in gadget finding.☆42Updated 7 years ago
- ☆55Updated 2 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Updated 11 years ago
- run AFL with pintool☆66Updated 5 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆36Updated 9 years ago
- A collection of user-space Linux kernel specific guided fuzzers based on LKL☆80Updated last week
- Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow☆55Updated 9 years ago
- ☆13Updated 3 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆25Updated 7 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆47Updated 8 years ago
- A framework for static analysis of ROP exploits and programs☆40Updated 6 years ago
- Linux Kernel Snapshot Fuzzer using KVM☆48Updated last year
- ☆24Updated 6 years ago
- exploit code for a bpf heap overflow vulnerability☆27Updated 5 years ago
- 3D Accelerated Exploitation☆54Updated 6 years ago
- ☆31Updated 5 years ago