Bw3ll / ROP_ROCKETLinks
ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Syscalls attack, a novel Heaven's Gate, and "shellcodeless" ROP. The framework utilizes emulation and obfuscation to help expand the attack surface.
☆119Updated this week
Alternatives and similar repositories for ROP_ROCKET
Users that are interested in ROP_ROCKET are comparing it to the libraries listed below
Sorting:
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆127Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 5 months ago
- ☆70Updated 2 years ago
- ☆74Updated 11 months ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆116Updated last year
- Windows KASLR bypass using prefetch side-channel☆102Updated last year
- CVE-2024-30090 - LPE PoC☆107Updated 8 months ago
- ☆105Updated 11 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆69Updated 4 months ago
- ☆145Updated last year
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆116Updated 11 months ago
- Static Binary Instrumentation tool for Windows x64 executables☆206Updated last month
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆66Updated last year
- ☆179Updated last year
- Admin to Kernel code execution using the KSecDD driver☆250Updated last year
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆112Updated 9 months ago
- An example reference design for a proposed BOF PE☆174Updated 2 months ago
- ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Wind…☆165Updated last year
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆228Updated 2 years ago
- Some of my windows kernel exploits for learning purposes☆128Updated 3 years ago
- LPE exploit for CVE-2023-36802☆22Updated last year
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆290Updated last year
- Exploitation of process killer drivers☆201Updated last year
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆62Updated 6 months ago
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆193Updated 2 months ago
- ☆64Updated last year
- Windows LPE exploit for CVE-2022-37969☆135Updated last year
- Analysis of the vulnerability☆51Updated last year
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆94Updated last year
- Toolkit to turn Chromium vulnerabilities into full-chain exploits☆99Updated this week