-
The current implementation of `Option` is lacking consistency and creates more problem than it actually solves.
1. It allows for a Some(null), which is, contractually broken (should be partially fixe…
-
When opening a new issue, please fill out the following sections:
### Expected behavior
get rop chain
### Actual behavior
[+] Enumerating 22 endings in 1 module(s)...
- Querying module m…
-
Hello,
I got an idea. I want to implement a feature on r2 that when the user puts a debugger to a point, turring, finds a set of gadgets to use together for stack buffer overflow attacks.
http:/…
-
The `pwndbg` command outputs a lot of commands, and listing them all alphabetically doesn't make finding useful ones easy. It would be better if we group related commands together by their functionali…
-
```
# ropper --file dbghelp.dll --chain virtualprotect
Traceback (most recent call last):
File "/usr/bin/ropper", line 11, in
load_entry_point('ropper==1.12.5', 'console_scripts', 'ropper'…
-
```
ropper --file /bin/bash --chain "execve cmd=/bin/sh" --badbytes 2f
```
```
[INFO] Load gadgets from cache
[LOAD] loading... 100%
[LOAD] filtering badbytes... 100%
[LOAD] removing double g…
-
What about speed method like:
https://youtu.be/tapxVpi-ke4?t=611
Runs GoldHen immediately without clicking a button
-
# Background
Currently pwn.college hosts a bunch of challenges primarily for the purposes of running ASU's CSE 466. As a result of it being open to the world, other non-ASU and non-466 students ca…
-
Recent versions of GCC (4.5 and later) for Linux x64 require the stack to be aligned on a 16-byte boundary when calling functions. Most of the time, 8 bytes works fine; this happens pretty often when …
-
Is there any way to translate the exploit loader texts into another language?