CRAXplusplus icon indicating copy to clipboard operation
CRAXplusplus copied to clipboard

The exploit generator CRAX++ is CRAX with a plugin system, s2e 2.0 upgrade, dynamic ROP, code selection, and I/O states (HITCON 2022)

Results 4 CRAXplusplus issues
Sort by recently updated
recently updated
newest added

Currently CRAX relies on pwnlib (and thus on pybind11) for ELF parsing, so some changes are made to S2E's makefiles. Maybe we could decouple pwnlib (and thus pybind11) from CRAXplusplus,...

enhancement

See master thesis: Exploiting Symbolic Locations for Abnormal Execution Paths

help wanted
good first issue

I cannot access the links for "Mow Wei-Loon and Hsiao Hsu-Chun. “Bypassing ASLR with Dynamic Binary Analysis for Automated Exploit Generation” (2021). " and "Wang Guan-Zhong and Huang Shih-Kun. "CRAXplusplus:...

I built CRAX++ on a VMware Ubuntu 20.04 environment following the BUILD.md instructions. I used debian-9.2.1-x86_64. I made the following modifications to \~/s2e/projects/sym_stdin/bootstrap.sh (我在VMware Ubuntu20.04环境下按照BUILD.md构建CRAX++,使用debian-9.2.1-x86_64,对~/s2e/projects/sym_stdin/bootstrap.sh做了如下修改 ): ``` - COMMON_TOOLS="s2ecmd s2eget...