https://github.com/albovo/ropemporium
In this repository, I've uploaded all the exploits 🐍 I've used to capture the flag 🚩 in a local context.
https://github.com/albovo/ropemporium
ctf-writeups pwn python3 return-oriented-programming
Last synced: 2 months ago
JSON representation
In this repository, I've uploaded all the exploits 🐍 I've used to capture the flag 🚩 in a local context.
- Host: GitHub
- URL: https://github.com/albovo/ropemporium
- Owner: AlBovo
- License: mit
- Created: 2023-08-08T17:34:15.000Z (almost 2 years ago)
- Default Branch: main
- Last Pushed: 2025-01-11T08:27:33.000Z (4 months ago)
- Last Synced: 2025-01-11T09:30:11.514Z (4 months ago)
- Topics: ctf-writeups, pwn, python3, return-oriented-programming
- Language: Python
- Homepage:
- Size: 35.2 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# ROP Emporium ⚙️
> [`ROP Emporium`](https://ropemporium.com/) is an online platform designed around the concept of ROP (Return-Oriented Programming)💻, a security technique often used in the field of cybersecurity. In this context, Rop Emporium serves as an educational resource and challenge platform for those looking to deepen their understanding of exploiting vulnerabilities through ROP. It provides users with various exercises that simulate real-world scenarios where attackers leverage ROP to bypass security mechanisms such as data execution prevention (DEP) and address space layout randomization (ASLR). The platform offers hands-on experience for security researchers, students, and professionals in the field of ethical hacking, allowing them to practice and refine their exploitation skills in a controlled environment.
_Chat GPT_
In this repository, I've uploaded all the exploits 🐍 I've used to capture the flag 🚩 in a local context.## Usage ⚡
All the exploits should follow these guidelines regarding the debugging of the exploit and its execution.
```
python3 exploit.py
```
If the **`DEBUG`** argument is passed to the exploit, it will spawn a *GDB* shell, hosting a GDB Server using the **KGX** terminal.