itzikkotler: So, I have decided to pack
Writing kernel exploits
Just tagged libo 0.1, a library for fast integer overflow detection . libo 0.1 released - Xi Wang
stack/heap/VTABLE/... method of exploitation
Heap Overflows For Humans 104 Created by mr_me on Sunday the 11 of March, 2012 Tags: heap , exploitation Welcome to the sixth installment of the Heap Overflow For Humans series, I hope the journey has been as interesting to you as it has for me. At this point, I can tell you that there are a few more series yet to come as we progress into windows 8.
Heap Overflows For Humans 103 Created by mr_me on Thu Jan 05 03:17:43 +1100 2012 Tags: bitmap attacks , bitmap flip , eip , exploit development , FreeListInUse , heap determinism , heaper , management structures , reversing , RtlCommitRoutine
Embedded in Academia : Integer Overflow Paper My coauthors and I just finished the final version of our paper about integer overflows in C/C++ programs that’s going to appear at ICSE 2012 , a software engineering conference. Basically we made a tool for dynamically finding integer overflows (and related integer undefined behaviors) and used it to look at a lot of software.
sandpile.org -- The world's leading source for technical x86 processor information.
Vulnerability analysis, Security Papers, Exploit Tutorials
[ Shell-Storm.org ] | Project | ROPgadget tool v3.3 2011-03-12 | Jonathan Salwan ROPgadget tool
Introduction to Writing Shellcode
BinDiff zynamics Bin Diff uses a unique graph-theoretical approach to compare executables by identifying identical and similar functions Description
DarunGrim: A Patch Analysis and Binary Diffing Tool
darun-grim-script -- scriptable version of DarunGrim3.
This article aims to provide you with the different steps needed to develop shellcode obfuscation techniques, and their respective deobfuscator assembly stubs. Simple shellcode obfuscation | Fun Over IP
heaper.py at master from mrmee/heaper - GitHub
si - Visualizing entropy in binary files Last week, I wrote about visualizing binary files using space-filling curves , a technique I use when I need to get a quick overview of the broad structure of a file. Today, I'll show you an elaboration of the same basic idea - still based on space-filling curves, but this time using a colour function that measures local entropy. Before I get to the details, let's quickly talk about the motivation for a visualization like this.
Most people know that ASLR randomizes the base address of the binary when loaded, but how does the loader know that a binary is ASLR capable? Question: How does loader know ASLR is enabled for a binary?
spray / mem patterns visualizer Heappie! is an exploit-writing-oriented memory analysis tool. It assists vulnerability researchers in tracking heap sprays (as well as other memory patterns) by providing visualization of the memory state.
hellman/libformatstr - GitHub
Intel Instruction Set 80x86 instruction set I have started to update this site which will cover all new processors. I have also changed the mirroring policy.
geek edition | X86 Opcode and Instruction Reference 1.11 General notes: POP CS Intel iAPX 86/88, 186/188 User's manual: When the opcode 0FH is encountered, the 8086,88 will execute a POP CS; the 80186,188 will execute an illegal instruction exception. Branch Prefixes Branch hints have effect only on NetBurst microarchitecture: A Detailed Look Inside the Intel NetBurst Micro-Architecture of the Intel Pentium 4 Processor: Branch hints are interpreted by the translation engine, and are used to assist branch prediction and trace construction hardware.
System Call Table Linux System Call Table The following table lists the system calls for the Linux 2.2 kernel. It could also be thought of as an API for the interface between user space and kernel space.