Skip to content

This repository contains a symbolic executor with capabilities of detecting common vulnerabilities in x86 binaries

Notifications You must be signed in to change notification settings

icemonster/AutoVulnDetect

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

27 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

AutoVulnDetect

This repository contains a symbolic executor capable of detecting common vulnerabilities in x86 binaries

Example (after compiling examples/vuln.c)

Analyse a binary called "vuln" that takes two arguments (--args).

One is the string "whatever" and the other has 32 unknown bytes (Sym32).

Try to craft an exploit (-e) that redirects execution flow (--RET_ADDR) to address 0x08048516

./AutoVulnDetect examples/vuln --args whatever Sym32 --RET_ADDR 0x08048516 -e

This will create a file called exploit.py with the crafted exploit.

Exploiting vuln is as simple as calling python3 exploit.py now

About

This repository contains a symbolic executor with capabilities of detecting common vulnerabilities in x86 binaries

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 3

  •  
  •  
  •