Bw3ll / JOP_ROCKETLinks
This framework enables user to discover JOP gagdets and can automate building a complete JOP chain to bypass DEP. JOP ROCKET is the ultimate solution for Windows jump-oriented programming. JOP ROCKET also finds the novel two-gadget dispatcher, which greatly expands what is possible with JOP.
☆110Updated last year
Alternatives and similar repositories for JOP_ROCKET
Users that are interested in JOP_ROCKET are comparing it to the libraries listed below
Sorting:
- Static Binary Instrumentation tool for Windows x64 executables☆207Updated 2 months ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆213Updated 5 years ago
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆253Updated 3 years ago
- Automatic ROPChain Generation☆293Updated 5 years ago
- ☆164Updated 4 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆71Updated last year
- ☆149Updated last year
- ☆85Updated 4 months ago
- ☆74Updated last year
- Helper idapython code for reversing kmdf drivers☆74Updated 3 years ago
- ☆81Updated 7 months ago
- pwn++ is a Windows & Linux library oriented for exploit dev but mostly used to play with modern C++ features☆170Updated 6 months ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- Unofficial Common Log File System (CLFS) Documentation☆185Updated 4 years ago
- CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is a "mirror" -- p…☆135Updated last week
- Idapython script to carve binary for internal RPC structures☆239Updated last year
- Notes on using the Python bindings for the Unicorn Engine☆81Updated 5 years ago
- Bindings for Microsoft WinDBG TTD☆233Updated 2 years ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆98Updated last year
- IOCTLpus can be used to make DeviceIoControl requests with arbitrary inputs (with functionality somewhat similar to Burp Repeater).☆94Updated 4 years ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆121Updated last year
- Leveraging patch diffing to discover new vulnerabilities☆137Updated last year
- Write-ups for crackmes and CTF challenges☆53Updated 3 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆232Updated 2 years ago
- Writeups for CTF challenges☆34Updated 2 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆195Updated last year
- Multi-tool reverse engineering collaboration solution.☆143Updated last year
- Windows Snapshot Fuzzer (SNAFUzz)☆35Updated last week
- ☆185Updated 2 years ago
- IDA Pro plugin for recognizing known hashes of API function names☆82Updated 3 years ago