shadow
ds3-nrssr-rce
shadow | ds3-nrssr-rce | |
---|---|---|
11 | 21 | |
1,352 | 143 | |
1.0% | - | |
9.8 | 0.0 | |
9 days ago | over 1 year ago | |
Rust | C++ | |
GNU General Public License v3.0 or later | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
shadow
-
Turmoil, a framework for developing and testing distributed systems
Cool, will be interested to see how this develops! tokio's loom framework has been a big help in testing some tricky concurrency code I've worked on.
Folks interested in this space might also be interested in the system I spend most of my time working on: Shadow. It also performs deterministic simulation of a network of hosts, but it intercepts network and system interactions at the syscall level via seccomp. As such it can work with binaries compiled from ~any language, usually without any code modification or special compilation. https://shadow.github.io/
-
I reinvented another wheel, linux threads.
Nice writeup! I've also had to dig a bit into this area in my work on shadow.
-
Shadow Simulation Developer
It is no longer active. If you are asking about Shadow, check out https://shadow.github.io
-
How to avoid bounds checks in Rust (without unsafe!)
I do share this hesitation. I think for simple cases iterators are usually fine, but I've definitely run into cases where an iterator adapter caused unexpected performance problems. e.g. https://github.com/shadow/shadow/pull/2543
-
Sending signals to Unix process groups
Yes. Though I'm not sure I see the connection to the OP...?
The example I'm most familiar with, because I work on it, is Shadow. We used ptrace for a bit but now use seccomp.
https://github.com/shadow/shadow/
- Shadow Simulator โ run real applications over a simulated Internet topology
-
Shadow Simlulator โ run real applications over a simulated Internet topology
For anyone interested in following current development on Shadow, we've been publishing a series of updates. Most recent: https://github.com/shadow/shadow/discussions/1274
The previous update has links back to the whole series; I stopped including it in the most-recent update since it was getting a bit cumbersome: https://github.com/shadow/shadow/discussions/1060
ds3-nrssr-rce
- Seems like it's just doesn't make sense to use Rust in gamedev
- How do you feel about comments made by Tim Sweeney?
- Think fast chucklenuts
- Rumors of GTA online exploits allowing remote code execution on gamer PCs
-
How to avoid bounds checks in Rust (without unsafe!)
Dark Souls III's servers were shut down for over half a year due to an exploit involving missing bounds checks that allowed remote code execution targeted at specific players https://github.com/tremwil/ds3-nrssr-rce
-
Elden Ring's co-op mod made the adventure new again
The only thing I could track down about this was a PoC repo demonstrating the exploit. Nothing about actually fixing it.
- SERVERS ARE BACK. JOLLY COOPERATION AND SUFFERING ONCE MORE
- Volvieron los servidores del Dark Souls 3
- Online features for the PC version of Dark Souls III reactivated. Other Dark Souls Titles still in process of reactivation
- Online features for the PC version of Dark Souls III have been reactivated.
What are some alternatives?
mininet - Emulator for rapid prototyping of Software Defined Networks
ds3os - Dark Souls - Open Server
tor - unofficial git repo -- report bugs/issues/pull requests on https://gitlab.torproject.org/ --
CVE-2020-15368 - CVE-2020-15368, aka "How to exploit a vulnerable driver"
shadow-plugin-tor - A Shadow plug-in that runs the Tor anonymity software
evil-mhyprot-cli - A PoC for Mhyprot2.sys vulnerable driver that allowing read/write memory in kernel/user via unprivileged user process.
rebop - Fast stochastic simulator for chemical reaction networks
herpaderping - Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
testground - ๐งช A platform for testing, benchmarking, and simulating distributed and p2p systems at scale.
Blue-Sentinel-Release
core - Common Open Research Emulator
DeauthDetector - Detect deauthentication frames using an ESP8266