Bw3ll / ROP_ROCKETLinks
ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Syscalls attack, a novel Heaven's Gate, and "shellcodeless" ROP. The framework utilizes emulation and obfuscation to help expand the attack surface.
☆159Updated last week
Alternatives and similar repositories for ROP_ROCKET
Users that are interested in ROP_ROCKET are comparing it to the libraries listed below
Sorting:
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Updated last year
- Vulnerable driver research tool, result and exploit PoCs☆217Updated last year
- ☆83Updated last month
- Some of my windows kernel exploits for learning purposes☆130Updated 3 years ago
- ☆178Updated 2 years ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆121Updated last year
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆144Updated last year
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 7 months ago
- ☆105Updated last year
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆217Updated 5 months ago
- ☆147Updated last year
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆237Updated 3 years ago
- CVE-2024-30090 - LPE PoC☆108Updated 11 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 9 months ago
- LPE exploit for CVE-2023-36802☆23Updated last year
- ☆64Updated last year
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆60Updated 5 months ago
- Windows LPE exploit for CVE-2022-37969☆136Updated 2 years ago
- ☆74Updated last year
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆114Updated last year
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆120Updated last year
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆317Updated last year
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆291Updated last month
- Windows KASLR bypass using prefetch side-channel☆128Updated last year
- ☆180Updated last year
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆97Updated 11 months ago
- Toolkit to turn Chromium vulnerabilities into full-chain exploits☆242Updated 2 weeks ago
- Static Binary Instrumentation tool for Windows x64 executables☆205Updated 5 months ago
- A few examples of how to trap virtual memory access on Windows.☆34Updated 9 months ago
- WinDbg extension written in Rust to dump the CPU / memory state of a running VM☆124Updated 3 weeks ago