Bw3ll / ROP_ROCKET
ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Syscalls attack, a novel Heaven's Gate, and "shellcodeless" ROP. The framework utilizes emulation and obfuscation to help expand the attack surface.
☆115Updated 5 months ago
Alternatives and similar repositories for ROP_ROCKET:
Users that are interested in ROP_ROCKET are comparing it to the libraries listed below
- Slides for COM Hijacking AV/EDR Talk on 38c3☆71Updated last month
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆113Updated 9 months ago
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆266Updated last year
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆125Updated 10 months ago
- ☆105Updated 7 months ago
- CVE-2024-30090 - LPE PoC☆103Updated 4 months ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆102Updated 5 months ago
- ☆71Updated 7 months ago
- ☆143Updated last year
- Some of my windows kernel exploits for learning purposes☆122Updated 2 years ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated this week
- ☆66Updated 2 years ago
- Windows KASLR bypass using prefetch side-channel☆76Updated 9 months ago
- ☆176Updated last year
- Vulnerable driver research tool, result and exploit PoCs☆184Updated last year
- Admin to Kernel code execution using the KSecDD driver☆243Updated 10 months ago
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆203Updated 3 months ago
- Exploitation of process killer drivers☆196Updated last year
- A set of programs for analyzing common vulnerabilities in COM☆193Updated 5 months ago
- Windows LPE exploit for CVE-2022-37969☆132Updated last year
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆224Updated 2 years ago
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆147Updated last year
- Static Binary Instrumentation tool for Windows x64 executables☆196Updated 2 weeks ago
- LPE exploit for CVE-2023-36802☆22Updated last year
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆115Updated 7 months ago
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆120Updated 9 months ago
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆93Updated 10 months ago
- ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Wind…☆165Updated last year
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆249Updated 5 months ago
- ☆111Updated this week