SQLab/CRAXplusplus
The exploit generator CRAX++ is CRAX with a plugin system, s2e 2.0 upgrade, dynamic ROP, code selection, and I/O states (HITCON 2022)
C++NOASSERTION
Issues
- 2
Assertion `guestDataSize == m_commandSize' failed in state 0: Invalid command size 60 != 84 from pagedir=0xf3c2000 pc=0xffffffffa00020eb
#20 opened by BlackHat-S - 3
CRAX++ exits immediately after executing aslr-nx sample binary without generating an exploit
#19 opened by keis94 - 5
pybind11-dev was not found
#16 opened by qijiale - 0
- 1
./launch-crax.sh
#18 opened by siruiTT - 1
How to obtain Thesis
#15 opened by qijiale - 8
5 [State 0] HostFiles: could not open /home/fuzz/s2e/projects/sym_stdin/guest-tools64/s2eget(errno 2)
#14 opened by blu3sh0rk - 10
Missing debian-9.2.1-x86 image.
#13 opened by blu3sh0rk - 3
Can not build CRAXplusplus in ubuntu20.04
#11 opened by LJP-TW - 1
繼續跑 good !!!
#10 opened by p870613 - 0
- 0
- 0
CRAX: properly handle plugin dependency
#4 opened by aesophor - 1
Decouple pwnlib and pybind11 from CRAX
#8 opened by aesophor - 0
CRAX/API: make Memory/Register API stateful
#5 opened by aesophor - 0
- 1
- 0
each technique should contain an assessment method to check whether it is viable
#2 opened by aesophor - 0