7etsuo / ROP-Lab-ServerLinks
VulnServer ROP: An Educational Platform for Exploring Buffer Overflow Vulnerabilities and Return-Oriented Programming Techniques
☆17Updated last year
Alternatives and similar repositories for ROP-Lab-Server
Users that are interested in ROP-Lab-Server are comparing it to the libraries listed below
Sorting:
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆87Updated last year
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managem…☆111Updated 2 years ago
- Collection of codes focused on Linux rootkits☆186Updated last month
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆130Updated 7 months ago
- In-Memory Rootkit For Linux and BSD☆86Updated 3 months ago
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆136Updated 11 months ago
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- Rust out-of-tree Linux Kernel Modules (LKMs) experimentation framework☆48Updated 2 years ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆43Updated last year
- ☆40Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 8 months ago
- ☆138Updated last week
- PoC for CVE-2024-48990☆104Updated last year
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆42Updated last year
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆107Updated 3 years ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆135Updated 5 months ago
- CVE-2024-30090 - LPE PoC☆108Updated last year
- Attacking the cleanup_module function of a kernel module☆52Updated 4 months ago
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆97Updated last year
- ☆39Updated 11 months ago
- Linux rootkit for educational purposes☆33Updated last year
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆147Updated last year
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 3 months ago
- The most complete code auditing platform with thousands of real-world challenges☆130Updated 5 months ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆38Updated 7 months ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆86Updated 9 months ago
- An automatic Blind ROP exploitation tool☆207Updated 2 years ago
- This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.☆55Updated last year
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆221Updated last year
- PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Iv…☆47Updated 10 months ago