4 tools and resources
Collection of Return-Oriented Programming challenges for practicing exploitation skills.
Collection of vulnerable ARM binaries for beginner vulnerability researchers & exploit developers.
Exploiting simple stack overflow vulnerabilities using return oriented programming (ROP) to defeat data execution prevention - DEP.
Search gadgets on binaries to facilitate ROP exploitation.