An automatic Blind ROP exploitation tool
☆208Jun 9, 2023Updated 2 years ago
Alternatives and similar repositories for Bropper
Users that are interested in Bropper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Callisto - An Intelligent Binary Vulnerability Analysis Tool☆371Jul 24, 2023Updated 2 years ago
- Go shellcode loader that combines multiple evasion techniques☆388Jun 21, 2023Updated 2 years ago
- Slides for presentations held at conferences☆48Jan 2, 2023Updated 3 years ago
- A python script to automatically dump files and source code of a Symfony server in debug mode.☆13Feb 11, 2025Updated last year
- A webshell plugin and interactive shell for pentesting JoGet application.☆14May 19, 2022Updated 3 years ago
- Tool written in Rust to enumerate the valid email addresses of an Azure/Office 365 Tenant☆15Feb 29, 2024Updated 2 years ago
- Cloud Exploit Framework☆112May 11, 2022Updated 3 years ago
- A C++ tool to unstrip Rust/Go binaries (ELF and PE)☆405Jan 25, 2025Updated last year
- GEF - GDB Enhanced Features - bata24's fork☆629Updated this week
- public archive for corCTF 2023☆18Aug 6, 2023Updated 2 years ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆73Dec 28, 2023Updated 2 years ago
- CVE-2022-31705 (Geekpwn 2022 Vmware EHCI OOB) POC☆120Jan 9, 2023Updated 3 years ago
- Coverage-Guided Greybox Distributed Fuzzer☆133Jan 26, 2026Updated last month
- A Python script to extract the list of users of a GiTea instance, unauthenticated or authenticated.☆15Feb 11, 2025Updated last year
- Use IDA PRO HexRays decompiler with OpenAI(ChatGPT) to find possible vulnerabilities in binaries☆376Nov 10, 2025Updated 4 months ago
- Custom Agent and Tooling for using Nyx with Firefox☆22Jul 23, 2025Updated 8 months ago
- 计算自身md5的最小ELF64程序.The minimum ELF64 program to calculate its own md5☆11Apr 20, 2020Updated 5 years ago
- Framework for Automating Fuzzable Target Discovery with Static Analysis.☆549Feb 1, 2024Updated 2 years ago
- ☆17Apr 27, 2023Updated 2 years ago
- Memory mapping profiles for forensic analysis using volatility 2☆53Sep 23, 2022Updated 3 years ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆131Nov 5, 2024Updated last year
- BinAbsInspector: Vulnerability Scanner for Binaries☆1,670Jun 17, 2024Updated last year
- Exploit for CVE-2022-27226☆15Mar 19, 2022Updated 4 years ago
- POC for CLFS CVE-2022-24481☆14May 14, 2023Updated 2 years ago
- A in-the-wild V8 type confusion bug.☆30Aug 8, 2025Updated 7 months ago
- ☆330Jun 20, 2024Updated last year
- PoC for CVE-2023-4911☆389Oct 4, 2023Updated 2 years ago
- A mini bytecode Interpreter for v8.☆23Nov 14, 2022Updated 3 years ago
- PE obfuscator with Evasion in mind☆213Apr 25, 2023Updated 2 years ago
- headless-ida-mcp-server☆37Apr 4, 2025Updated 11 months ago
- harness for fuzzing with winafl. both public and my own which i have released.☆58Mar 2, 2021Updated 5 years ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 5 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- ☆216Mar 29, 2024Updated last year
- A GraphQL enumeration and extraction tool☆133Jan 29, 2023Updated 3 years ago
- ROPfuscator is a fine-grained code obfuscation framework for C/C++ programs using ROP (return-oriented programming).☆437May 8, 2024Updated last year
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆80Nov 18, 2024Updated last year
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Jul 2, 2025Updated 8 months ago
- Retrieve AD accounts description and search for password in it☆81Jul 21, 2022Updated 3 years ago