rop   156

« earlier    

GitHub - salls/angrop
"a tool to automatically generate rop chains. It is built on top of angr's symbolic execution engine, and uses constraint solving for generating chains and understanding the effects of gadgets. angrop should support all the architectures supported by angr, although more testing needs to be done. Typically, it can generate rop chains (especially long chains) faster than humans. It includes functions to generate chains which are commonly used in exploitation and CTF's, such as setting registers, and calling functions."
security  rop  tools  exploits 
25 days ago by mechazoidal
Weird Machines HQ
The expression "weird machines" was first used in the RSS 2009 talk. It referred to state-of-the-art exploitation as finding and programming an execution model (a machine, such as a virtual automaton) within the target via crafted inputs. It was soon extended to other methods of reliably or probabilistically influencing the target's state.
weird_machines  rop  exploits  bibliography  security 
8 weeks ago by nmh
Новая, отточенная, умопомрачительная, минималистичная игра-головоломка с десятками уровней и необыкновенным дизайном...
appstore  ios  games  rop  mildmania 
july 2018 by moalex
Return-oriented programming - Wikipedia
Return-oriented programming (ROP) is a computer security exploit technique that allows an attacker to execute code in the presence of security defenses such as executable space protection and code signing.[1]
exploits  security  cracking  wikipedia  rop 
may 2018 by wjy
ROP example walkthrough
ROP example walkthrough with graphics depicting the stack layout
ROP  example  walkthrough  exploit 
april 2018 by vincelasal
ROP Emporium
ROP Emporium: Learn return-oriented programming through a series of challenges
security  ctf  training  ROP 
january 2018 by simmoril

« earlier    

related tags

2015  32c3  address  appstore  arm  articles  aslr  attack  automation  awesometalks  basic  bibliography  binary  blog  books  bostom  c#  caleb  cet  chain  challenges  code  coding  coding_&_security  compiler  corelan  cracking  craft  critique  ctf  database  debugger  defense  delicious  design  detection  development  diy  dvrf  elixir  emulator  error  example  exploit  exploitation-automation  exploitation  exploits  f#  father/son  fatherhood  floss  framework  frank  freebsd  functional-programming  functional  gadget  games  generator  grsecurity  hacking  hardware  heap  herbstcampus  houdini  immunity  injection  intel  ios  islam  jails  kernel  libc  library  linux  list  malware  mask  maybe  memory-corruption  memory  metaprogramming  mildmania  mips  mitigation  mona  monad  netsec  offset  opensource  oriented  otl  owl  paper  papers  pattern  pax  pentest  pentesting  php  plt  politics  posicionamientoweb  programming  project  protection  ps4  pwn  python  railway  railwayorientedprogramming  rap  rce  re  research  return-oriented-programming  return  returnorientedprogramming  reverse-engineering  reverseengineering  reversing  rieger  ring_-2  ropgadget  search  security  seo  signals  software_security  solver  sony  srop  stack  talks  technique  tools  training  tutorial  tutorials  unicorn  unikernel  videos  vulnerability  walkthrough  weird_machines  wikipedia  windows  with  x86  z3 

Copy this bookmark: