emb-team/shell-exploit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
To build run make all ├── asm-32 test application, don't run ├── asm-64 test application, don't run ├── asm_x32.c shellcode for x86 32bit ├── asm_x64.c test assembler code for x86_64 ├── Makefile ├── obsolete various tests for different distros │ ├── mprotect_test.c │ ├── shellv2.c │ ├── testv1_centos.c │ ├── testv1_fedora.c │ └── testv2.c ├── README ├── seccomp-bpf.h header file needed for seccomp() ├── shell-exploit-32 vulnerable tcp/ip server app x86 ├── shell-exploit-64 vulnerable tcp/ip server app x86_64 ├── shell-exploit.c ├── test-exploit-32 exploit x86 ├── test-exploit-64 exploit x86_64 For more information please checkout: https://www.emb-team.com/stack-canary-and-aslr-bypassing-on-x86_64/ https://www.emb-team.com/stack-canary-and-aslr-bypassing-on-x86_32/
About
Exploit sample bypassing stack canary and ASLR on x86/x86_64
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published