There are 8 repositories under return-oriented-programming topic.
ROPfuscator is a fine-grained code obfuscation framework for C/C++ programs using ROP (return-oriented programming).
ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Syscalls attack, a novel Heaven's Gate, and "shellcodeless" ROP. The framework utilizes emulation and obfuscation to help expand the attack surface.
Very simple script(s) to hasten binary exploit creation
Borrowed Instructions Synthetic Computation
991CN X 反编译及资料整理
ROP Benchmark is a tool to compare ROP compilers
Stack Based buffer overflow attack
buffer overflow exploits for simple c programs (64 bit)
This is the source of our Return Oriented Programming tool.
A tool for synthesizing code-reuse attacks (aka ROP) from a reference program, powered by logical modeling of Ghidra's `p-code` IL.
ARM (A32) Linux Return-oriented Programming with Raspberry Pi
Finding and classifying ROP gadgets from rp++ output file with some regex and a CLI.
Examples of Binary Exploitations - Buffer Overflow, Return-Oriented Programming and Format String
Simple bash script to filter out useful ROP gadgets from rp++ output while bypassing DEP
Windows Exploit development : Bypass Data Execution Prevention (DEP) using ROP chains manually hard code
Backtesting Algo-Trading Strategies, FinTech Analysis & Portfolio Optimization: NVDA, AMD, INTC, MSI vs S&P 500 Benchmark
My course work about basic binary exploitation.🤿
Tesi magistrale di Ingegneria Informatica Magistrale su Attacchi Buffer Overflow e Return Oriented Programming in architetture RISC-V, Università di Bologna
This is the place where we will put all the experiments we do to build the ROP-Compiler
Some notes to begin pwn properly
Final Project - CS155 (Computer Science I)
Return-oriented programming (ROP)
ROP Gadget finding utility written in C
All CTFs solved in Offensive and Defensive Cyber Security course of Polytechnic of Milan 23/24 edition
Writeup for my solutions to the challenges on ropemporium.com
Reverse Engineering & Binary Exploitation Warm Up for CTF
In this repository, I've uploaded all the exploits 🐍 I've used to capture the flag 🚩 in a local context.
A repository to hold code for security related examples