- Download the latest Intel PIN distribution.
- Clone this repository. Move the
RopDetect
directory in<pin-home>/source/tools/
. - To compile the tool go inside the RopDetect/ directory and run
make obj-ia32/RopDetect.dll TARGET=ia32
. If you are on a 64bit system you can still compile the tool, but the test applications and exploits are targeted at Windows 7 32bit system. On Linux the target extension is.so
while on macOS it's.dylib
. - To execute the tool run from within
RopDetect/
:../../../pin -t obj-ia32/RopDetect.dll -- path/to/app
.
-
Notifications
You must be signed in to change notification settings - Fork 0
An Intel PIN tool for dynamic detection of Return Oriented Programming attacks
License
spallas/ropbuster
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
An Intel PIN tool for dynamic detection of Return Oriented Programming attacks
Topics
Resources
License
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published