Hakumarachi / Bropper
An automatic Blind ROP exploitation tool
☆196Updated last year
Alternatives and similar repositories for Bropper:
Users that are interested in Bropper are comparing it to the libraries listed below
- Pwn2Own Vancouver 2023 Ubuntu LPE exploit☆158Updated last year
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆217Updated 9 months ago
- ☆175Updated last year
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆163Updated 10 months ago
- ASLR bypass without infoleak☆158Updated 3 years ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆125Updated 10 months ago
- ☆210Updated 10 months ago
- Linux Bluetooth - Run arbitrary management commands as an unprivileged user☆85Updated last year
- Leveraging patch diffing to discover new vulnerabilities☆111Updated 3 months ago
- ROP ROCKET is an advanced code-reuse attack framework, with extensive ROP chain generation capabilities, including for novel Windows Sysc…☆115Updated 5 months ago
- CVE-2023-4911 proof of concept☆167Updated last year
- A python module to explore the object tree to extract paths to interesting objects in memory.☆86Updated 2 weeks ago
- This tool is used for backdoor,shellcode generation,Information retrieval and POC arrangement for various architecture devices☆184Updated 3 months ago
- ☆153Updated last year
- ☆70Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆140Updated 3 months ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆357Updated 2 years ago
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆135Updated last month
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆93Updated 4 months ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆97Updated this week
- Proof-of-Concept for CVE-2023-38146 ("ThemeBleed")☆192Updated last year
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆112Updated 9 months ago
- ☆43Updated 3 years ago
- ☆87Updated last month
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆64Updated 10 months ago
- Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit☆269Updated last year
- ☆201Updated 3 months ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆124Updated 2 years ago
- An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23☆115Updated last year