All Questions
1 question
- Bountied 0
- Unanswered
- Frequent
- Score
- Trending
- Week
- Month
- Unanswered (my tags)
5votes
1answer
2kviews
ROP Exploitation on ARM
I was wondering about since, Ret2Libc attack doesn't works on ARM, and we have to rely on ROP for that. How different is ROP on ARM from the x86 architecture. Are there any tools, such as mona.py ...
- The Overflow Blog
- Featured on Meta
Hot Network Questions
- Are these chainrings or cassette cooked? 3 year old road bike
- Doubt regarding center of mass of a cone
- Could OLS miss statistically significant coefficient because it's too small?
- Why do the infected not attack each other?
- Awake and asleep
- Why is the を particle used instead of the から particle?
- Does Exodus 31:16 teach that the old covenant is eternal?
- Revising part of a manuscript not covered by the referee report
- Children and aliens grow up together
- Why isn't a misfiled attorney-client memo fair game for use in a trial?
- Why did Germany allow and help introduce the Deutsche Mark to Montenegro?
- Display ANSI color in the echo area
- Unknown DC bias added to AC source
- Is Backpropagation faulty?
- Is termination of employment for refusal to work overtime legal?
- Travelling to US by road by personal car and leaving by personal car
- Is it normal that my phd supervisor raises new questions for me to revise every time after reviewing my manuscript?
- Etmeha (אתמהא) equivalent to clickbait?
- Boids by Simon Woods: can we re-invent further efficient flocking models to forge complexity from simple rules?
- "Presenting" versus "bearing" a U.S.A. passport when entering Canada from the U.S.A
- לשנה הבאה בירושלים - why wait till next year
- Annotating intentional infinite loop to satisfy "-fanalyzer"
- How to convincingly erase a population's memory?
- Pfsense router NAT Redirection not working