Skip to content
#

exploit-development

Here are 105 public repositories matching this topic...

This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.

  • Updated Feb 24, 2020
  • Python
gef
Grazfather
Grazfather commented Apr 9, 2018

we should be able to determine the name of the syscall and the args, based on the abi.

If we assume linux (we shouldn't) we can put this in the arch.

is_syscall
get_syscall_args

are probably the only methods we need to add. man syscall to see the abis.
Only issue is that we don't know, unless we hardcode, which args are used, unless we backtrack to see which registers were written

arissploit

Arissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.

  • Updated Feb 24, 2020
  • Python

Improve this page

Add a description, image, and links to the exploit-development topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the exploit-development topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.