Challenges and exams' solution from the Cybersecurity course
-
Updated
Oct 18, 2024 - C
Challenges and exams' solution from the Cybersecurity course
capture the flag challenges
ROP Gadget finding utility written in C
ARM (A32) Linux Return-oriented Programming with Raspberry Pi
Basic implementation of a shadow stack in C language, for ROP and stack-based buffer overflow mitigation
Security analysis for the RISC-V ISA
Scripts used for the Software systems exploitation course
A testbed for RISCV vulnerable binaries that aims to produce meaningful fingerprints recognizable by a Control Flow integrity Machine Learning Algorithm.
C library that is intended for providing methods for executing and injecting code.
Some exercises from my System and Network Hacking course @ University of Pisa
WPI CS2011 Assembly Assignments for B-term 2017
Red-team tool to hook libc read syscall with a buffer overflow vulnerability.
Add a description, image, and links to the rop topic page so that developers can more easily learn about it.
To associate your repository with the rop topic, visit your repo's landing page and select "manage topics."