CRAXplusplus
CRAXplusplus copied to clipboard
The exploit generator CRAX++ is CRAX with a plugin system, s2e 2.0 upgrade, dynamic ROP, code selection, and I/O states (HITCON 2022)
Currently CRAX relies on pwnlib (and thus on pybind11) for ELF parsing, so some changes are made to S2E's makefiles. Maybe we could decouple pwnlib (and thus pybind11) from CRAXplusplus,...
See master thesis: Exploiting Symbolic Locations for Abnormal Execution Paths
I cannot access the links for "Mow Wei-Loon and Hsiao Hsu-Chun. “Bypassing ASLR with Dynamic Binary Analysis for Automated Exploit Generation” (2021). " and "Wang Guan-Zhong and Huang Shih-Kun. "CRAXplusplus:...
I built CRAX++ on a VMware Ubuntu 20.04 environment following the BUILD.md instructions. I used debian-9.2.1-x86_64. I made the following modifications to \~/s2e/projects/sym_stdin/bootstrap.sh (我在VMware Ubuntu20.04环境下按照BUILD.md构建CRAX++,使用debian-9.2.1-x86_64,对~/s2e/projects/sym_stdin/bootstrap.sh做了如下修改 ): ``` - COMMON_TOOLS="s2ecmd s2eget...