Bw3ll / ROP_ROCKET
ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Syscalls attack, a novel Heaven's Gate, and "shellcodeless" ROP. The framework utilizes emulation and obfuscation to help expand the attack surface.
☆115Updated this week
Alternatives and similar repositories for ROP_ROCKET:
Users that are interested in ROP_ROCKET are comparing it to the libraries listed below
- ☆144Updated last year
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆114Updated 10 months ago
- ☆72Updated 8 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 3 weeks ago
- ☆105Updated 8 months ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆126Updated 11 months ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆225Updated 2 years ago
- ☆66Updated 2 years ago
- CVE-2024-30090 - LPE PoC☆105Updated 4 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆72Updated 2 months ago
- ☆177Updated last year
- Some of my windows kernel exploits for learning purposes☆122Updated 2 years ago
- Get information about stripped rust executables☆25Updated 2 months ago
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆272Updated last year
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆114Updated 8 months ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆103Updated 6 months ago
- Static Binary Instrumentation tool for Windows x64 executables☆198Updated last month
- Windows KASLR bypass using prefetch side-channel☆78Updated 10 months ago
- ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Wind…☆165Updated last year
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆90Updated 4 months ago
- Implementation of an export address table protection mitigation, like Export Address Filtering (EAF)☆97Updated last year
- Windows LPE exploit for CVE-2022-37969☆132Updated last year
- Admin to Kernel code execution using the KSecDD driver☆245Updated 10 months ago
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆112Updated 4 months ago
- Writeups for CTF challenges☆30Updated last year
- ☆94Updated 2 years ago
- Interceptor is a kernel driver focused on tampering with EDR/AV solutions in kernel space☆122Updated 2 years ago
- LPE exploit for CVE-2023-36802☆22Updated last year
- ☆63Updated last year