Skip to content

emb-team/shell-exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

To build run make all

├── asm-32			test application, don't run
├── asm-64			test application, don't run
├── asm_x32.c			shellcode for x86 32bit
├── asm_x64.c			test assembler code for x86_64
├── Makefile
├── obsolete			various tests for different distros
│   ├── mprotect_test.c
│   ├── shellv2.c
│   ├── testv1_centos.c
│   ├── testv1_fedora.c
│   └── testv2.c
├── README
├── seccomp-bpf.h		header file needed for seccomp()
├── shell-exploit-32		vulnerable tcp/ip server app x86
├── shell-exploit-64		vulnerable tcp/ip server app x86_64
├── shell-exploit.c
├── test-exploit-32		exploit x86
├── test-exploit-64		exploit x86_64

For more information please checkout:
https://www.emb-team.com/stack-canary-and-aslr-bypassing-on-x86_64/
https://www.emb-team.com/stack-canary-and-aslr-bypassing-on-x86_32/

About

Exploit sample bypassing stack canary and ASLR on x86/x86_64

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published