Basic implementation of a shadow stack in C language, for ROP and stack-based buffer overflow mitigation
-
Updated
Oct 30, 2024 - C
Basic implementation of a shadow stack in C language, for ROP and stack-based buffer overflow mitigation
Scripts used for the Software systems exploitation course
A testbed for RISCV vulnerable binaries that aims to produce meaningful fingerprints recognizable by a Control Flow integrity Machine Learning Algorithm.
capture the flag challenges
ARM (A32) Linux Return-oriented Programming with Raspberry Pi
ROP Gadget finding utility written in C
Security analysis for the RISC-V ISA
A digital blacksmithing for ROP chains.
Challenges and exams' solution from the Cybersecurity course
Some exercises from my System and Network Hacking course @ University of Pisa
C library that is intended for providing methods for executing and injecting code.
Stealthy x64 thread manipulation library for calling functions inside target processes without creating remote threads or installing hooks.
Red-team tool to hook libc read syscall with a buffer overflow vulnerability.
WPI CS2011 Assembly Assignments for B-term 2017
Add a description, image, and links to the rop topic page so that developers can more easily learn about it.
To associate your repository with the rop topic, visit your repo's landing page and select "manage topics."