Bw3ll / ROP_ROCKETLinks
ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Syscalls attack, a novel Heaven's Gate, and "shellcodeless" ROP. The framework utilizes emulation and obfuscation to help expand the attack surface.
☆164Updated last month
Alternatives and similar repositories for ROP_ROCKET
Users that are interested in ROP_ROCKET are comparing it to the libraries listed below
Sorting:
- Vulnerable driver research tool, result and exploit PoCs☆226Updated 2 years ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆127Updated last year
- Some of my windows kernel exploits for learning purposes☆134Updated 3 years ago
- ☆105Updated last year
- ☆85Updated 5 months ago
- Exploit targeting NT kernel in 24H2 Windows Insider Preview☆149Updated last year
- CVE-2025-50168 Exploit PoC — Pwn2Own Berlin 2025 - LPE(Windows 11) winning bug.☆139Updated 2 months ago
- ☆74Updated last year
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆65Updated 9 months ago
- ☆179Updated 2 years ago
- CVE-2024-30090 - LPE PoC☆107Updated last year
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 11 months ago
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆226Updated 9 months ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆121Updated last year
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆246Updated 3 years ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated last year
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆119Updated last year
- LPE exploit for CVE-2023-36802☆24Updated 2 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆124Updated last year
- Windows KASLR bypass using prefetch side-channel☆172Updated last year
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆324Updated 3 months ago
- ☆64Updated last year
- Static Binary Instrumentation tool for Windows x64 executables☆207Updated 3 months ago
- ☆150Updated last year
- Exploitable drivers, you know what I mean☆154Updated 2 months ago
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆65Updated last year
- ETW based POC to identify direct and indirect syscalls☆190Updated 2 years ago
- ☆149Updated 2 years ago
- Repo with different exploits & PoCs☆66Updated 8 months ago
- a tool used to analyze and monitor in named pipes☆193Updated last year