The Wayback Machine - https://web.archive.org/web/20191211031946/https://github.com/topics/exploit
Skip to content
#

exploit

Here are 694 public repositories matching this topic...

Grazfather
Grazfather commented Apr 9, 2018

we should be able to determine the name of the syscall and the args, based on the abi.

If we assume linux (we shouldn't) we can put this in the arch.

is_syscall
get_syscall_args

are probably the only methods we need to add. man syscall to see the abis.
Only issue is that we don't know, unless we hardcode, which args are used, unless we backtrack to see which registers were written

Improve this page

Add a description, image, and links to the exploit topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the exploit topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.