Bw3ll / ROP_ROCKETLinks
ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Syscalls attack, a novel Heaven's Gate, and "shellcodeless" ROP. The framework utilizes emulation and obfuscation to help expand the attack surface.
☆152Updated 2 weeks ago
Alternatives and similar repositories for ROP_ROCKET
Users that are interested in ROP_ROCKET are comparing it to the libraries listed below
Sorting:
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Updated last year
- Some of my windows kernel exploits for learning purposes☆130Updated 3 years ago
- Vulnerable driver research tool, result and exploit PoCs☆213Updated last year
- ☆80Updated last week
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆204Updated 4 months ago
- ☆180Updated 2 years ago
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆136Updated last year
- CVE-2024-30090 - LPE PoC☆107Updated 10 months ago
- ☆105Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 7 months ago
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆59Updated 4 months ago
- ☆74Updated last year
- Windows KASLR bypass using prefetch side-channel☆118Updated last year
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆231Updated 3 years ago
- Aplos an extremely simple fuzzer for Windows binaries.☆69Updated 6 months ago
- LPE exploit for CVE-2023-36802☆22Updated last year
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆117Updated last year
- ☆177Updated last year
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆310Updated last year
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆62Updated 8 months ago
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆283Updated last week
- Windows LPE exploit for CVE-2022-37969☆136Updated 2 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆118Updated last year
- ☆147Updated last year
- ☆96Updated 3 years ago
- Static Binary Instrumentation tool for Windows x64 executables☆206Updated 3 months ago
- A few examples of how to trap virtual memory access on Windows.☆33Updated 8 months ago
- ☆64Updated last year
- a tool used to analyze and monitor in named pipes☆176Updated 9 months ago
- Repo with different exploits & PoCs☆64Updated 3 months ago