Bw3ll / ROP_ROCKET
ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Syscalls attack, a novel Heaven's Gate, and "shellcodeless" ROP. The framework utilizes emulation and obfuscation to help expand the attack surface.
☆117Updated this week
Alternatives and similar repositories for ROP_ROCKET:
Users that are interested in ROP_ROCKET are comparing it to the libraries listed below
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆127Updated last year
- Windows KASLR bypass using prefetch side-channel☆90Updated last year
- ☆105Updated 9 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆73Updated 4 months ago
- ☆68Updated 2 years ago
- ☆145Updated last year
- CVE-2024-30090 - LPE PoC☆106Updated 6 months ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆115Updated last year
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆227Updated 2 years ago
- ☆73Updated 10 months ago
- Static Binary Instrumentation tool for Windows x64 executables☆201Updated last month
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆117Updated 6 months ago
- ☆179Updated last year
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 2 months ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆109Updated 7 months ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆116Updated 9 months ago
- Some of my windows kernel exploits for learning purposes☆123Updated 2 years ago
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆284Updated last year
- LPE exploit for CVE-2023-36802☆22Updated last year
- Windows LPE exploit for CVE-2022-37969☆134Updated last year
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆92Updated 6 months ago
- Writeups for CTF challenges☆31Updated last year
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆106Updated 2 months ago
- ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Wind…☆167Updated last year
- Vulnerable driver research tool, result and exploit PoCs☆193Updated last year
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆64Updated last year
- An example reference design for a proposed BOF PE☆163Updated 2 weeks ago
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆187Updated 3 weeks ago
- Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver☆148Updated last year
- a modified CONTEXT based ropchain to circumvent CFG-FindHiddenShellcode and EtwTi-FluctuationMonitor☆92Updated last year