Shell script to launch a Bash instance, from which all child processes will have ASLR disabled
-
Updated
Nov 18, 2017 - Shell
Shell script to launch a Bash instance, from which all child processes will have ASLR disabled
Buffer Overflow attacks on Linux
My assignments on GDB and Computer Architecture; Buffer Overflow; Stack Overflow and ROP gadgets; ASLR; Heap Overflow; Type Confusion; Injection Attack; Fuzzing.
Removes ASLR in iOS applications
Deep dives into ASLR and stack overflow vulnerabilities.
This lab required the execution of a buffer-overflow attack variant, known as return-to-libc, bypassing existing protection schemes implemented in Linux OS.
Repo code for the related post on SecSI Blog: https://secsi.io/blog/blueborne-kill-chain-on-dockerized-android
collection of articles of random topics for private research purposes
libc_database python wrapper for exploit automation
The project collects the gadgets and records the time to obtain gadgets from a process by utilizing an attack technique called Just-In-Time Return-Oriented Programming (JIT-ROP). We utilize the JIT-ROP technique to evaluate different fine-grained address space layout randomization (ASLR) schemes and measure the upper bound of effective re-random…
File Capability Extractor
Dynamic loading with privilege separation
Add a description, image, and links to the aslr topic page so that developers can more easily learn about it.
To associate your repository with the aslr topic, visit your repo's landing page and select "manage topics."