{"id":13362278,"url":"https://github.com/Billy-Ellis/Exploit-Challenges","last_synced_at":"2025-03-12T15:30:53.626Z","repository":{"id":41844431,"uuid":"82728550","full_name":"Billy-Ellis/Exploit-Challenges","owner":"Billy-Ellis","description":"A collection of vulnerable ARM binaries for practicing exploit development","archived":false,"fork":false,"pushed_at":"2021-11-15T20:10:07.000Z","size":24842,"stargazers_count":896,"open_issues_count":3,"forks_count":169,"subscribers_count":62,"default_branch":"master","last_synced_at":"2024-11-03T03:31:57.361Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":null,"language":"C","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/Billy-Ellis.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2017-02-21T21:23:18.000Z","updated_at":"2024-11-02T02:00:29.000Z","dependencies_parsed_at":"2022-07-18T08:17:08.110Z","dependency_job_id":null,"html_url":"https://github.com/Billy-Ellis/Exploit-Challenges","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Billy-Ellis%2FExploit-Challenges","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Billy-Ellis%2FExploit-Challenges/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Billy-Ellis%2FExploit-Challenges/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Billy-Ellis%2FExploit-Challenges/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/Billy-Ellis","download_url":"https://codeload.github.com/Billy-Ellis/Exploit-Challenges/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":243242695,"owners_count":20259804,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-07-29T23:00:40.187Z","updated_at":"2025-03-12T15:30:53.235Z","avatar_url":"https://github.com/Billy-Ellis.png","language":"C","readme":"# Exploit-Challenges\nHere are a collection of vulnerable ARM binaries designed for beginner vulnerability researchers \u0026 exploit developers to play around with and test their skills! \n\nThese binaries are all built as ARMv7 Mach-O executables (unless specified otherwise) so it is recommended that you use a 32bit jailbroken iOS device with `radare2` or another debugging utility installed to test them.\n\n### ARM 32-bit\n\n`roplevel1` - simple introduction to Return Oriented Programming with a simple objective\n\n`roplevel2` - same idea as level 1 but with a new objective\n\n`roplevel3` - more advanced use of ROP\n\n`roplevel4` - dealing with ASLR (infoleak)\n\n`roplevel5` - same as lvl4 but requires exploitation of format string vuln for the info leak\n\n`roplevel6` - execute ROP chain by making use of a stack pivot\n\n`roplevel7` - off-by-one vulnerability\n\n`heaplevel1` - simple heap based overflow example\n\n`heaplevel2` - Use-After-Free exploit\n\n`heaplevel3` - double free()\n\n`Xylex` - real-world(ish) example system\n\n### ARM 64-bit\n\n`roplevel1-64` - 64-bit version of roplevel1\n\n`roplevel6-64` - 64-bit version of roplevel6\n\n## Help \u0026 Guidance\n\nWrite-ups/explanations on some of the binaries can be found on my YouTube channel [here](https://youtube.com/c/BillyEllis) or in my book [Beginner's Guide to Exploitation on ARM](http://zygosec.com/products.html).\n\nIf you have any questions or requests for future exploitation challenges, tweet me [@bellis1000](https://twitter.com/bellis1000)\n","funding_links":[],"categories":["Pentesting","C","CTF / Training Binaries"],"sub_categories":["Exploits"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FBilly-Ellis%2FExploit-Challenges","html_url":"https://awesome.ecosyste.ms/projects/github.com%2FBilly-Ellis%2FExploit-Challenges","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FBilly-Ellis%2FExploit-Challenges/lists"}