Shell script to launch a Bash instance, from which all child processes will have ASLR disabled
-
Updated
Nov 18, 2017 - Shell
Shell script to launch a Bash instance, from which all child processes will have ASLR disabled
Red-team tool to hook libc read syscall with a buffer overflow vulnerability.
Buffer Overflow attacks on Linux
This lab required the execution of a buffer-overflow attack variant, known as return-to-libc, bypassing existing protection schemes implemented in Linux OS.
Repo code for the related post on SecSI Blog: https://secsi.io/blog/blueborne-kill-chain-on-dockerized-android
The project collects the gadgets and records the time to obtain gadgets from a process by utilizing an attack technique called Just-In-Time Return-Oriented Programming (JIT-ROP). We utilize the JIT-ROP technique to evaluate different fine-grained address space layout randomization (ASLR) schemes and measure the upper bound of effective re-random…
libc_database python wrapper for exploit automation
collection of articles of random topics for private research purposes
Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)
Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.
Deep dives into ASLR and stack overflow vulnerabilities.
Add a description, image, and links to the aslr topic page so that developers can more easily learn about it.
To associate your repository with the aslr topic, visit your repo's landing page and select "manage topics."