ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer overflow vulnerabilities, and memory leaks.
☆88May 11, 2024Updated last year
Alternatives and similar repositories for Ropdump
Users that are interested in Ropdump are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Mar 29, 2026Updated last month
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated last year
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- Zero-dependency MCP server implementation.☆74Mar 27, 2026Updated last month
- This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.☆55Apr 18, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆186Apr 24, 2025Updated last year
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆130Nov 12, 2023Updated 2 years ago
- .NET deserialization hunter☆90Jul 21, 2024Updated last year
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35May 8, 2023Updated 2 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆47Jul 29, 2024Updated last year
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- converts sRDI compatible dlls to shellcode☆38Jan 20, 2025Updated last year
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆131Sep 27, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 🌒 Shell command obfuscation to avoid detection systems☆122Oct 10, 2022Updated 3 years ago
- AWS Cloud Landscape Search Engine☆20Nov 29, 2023Updated 2 years ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆180Jun 10, 2024Updated last year
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆498Nov 29, 2022Updated 3 years ago
- Rewrite to fit my needs☆33Jul 20, 2024Updated last year
- Memory Scaner☆65Sep 9, 2022Updated 3 years ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆195Feb 24, 2026Updated 2 months ago
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆112Jan 17, 2024Updated 2 years ago
- Perfect DLL Proxying using forwards with absolute paths.☆347Nov 3, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated 3 months ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Go shellcode loader that combines multiple evasion techniques☆387Jun 21, 2023Updated 2 years ago
- CDPwn is a python script designed to capture screenshots of files via the Chrome DevTools Protocol (CDP), a technique useful for privileg…☆14May 23, 2024Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆57Dec 31, 2025Updated 4 months ago
- ☆114Aug 25, 2023Updated 2 years ago
- .bin file to shellcode convertor☆39Jul 5, 2024Updated last year
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆119Apr 8, 2023Updated 3 years ago
- ☆102Oct 7, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Implementation of sllvm obfuscator☆66Nov 5, 2022Updated 3 years ago
- a tool to help operate in EDRs' blind spots☆770Dec 2, 2024Updated last year
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆74Feb 11, 2024Updated 2 years ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆594Jun 12, 2024Updated last year
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- ( 0day ) Local Privilege Escalation in IObit Malware Fighter☆171Mar 30, 2025Updated last year
- ☆10Jun 16, 2021Updated 4 years ago