ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer overflow vulnerabilities, and memory leaks.
☆88May 11, 2024Updated last year
Alternatives and similar repositories for Ropdump
Users that are interested in Ropdump are comparing it to the libraries listed below
Sorting:
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated last week
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 10 months ago
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆131Nov 12, 2023Updated 2 years ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- .NET deserialization hunter☆82Jul 21, 2024Updated last year
- This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.☆55Apr 18, 2024Updated last year
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆191Updated this week
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated last month
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆177Jun 10, 2024Updated last year
- AWS Cloud Landscape Search Engine☆20Nov 29, 2023Updated 2 years ago
- masscan with exclusive excludes☆58Nov 8, 2023Updated 2 years ago
- Zero-dependency MCP server implementation.☆59Feb 23, 2026Updated last week
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35May 8, 2023Updated 2 years ago
- ☆181Apr 24, 2025Updated 10 months ago
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- .bin file to shellcode convertor☆39Jul 5, 2024Updated last year
- ☆114Aug 25, 2023Updated 2 years ago
- ☆10Jun 16, 2021Updated 4 years ago
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆497Nov 29, 2022Updated 3 years ago
- Memory Scaner☆65Sep 9, 2022Updated 3 years ago
- a tool to help operate in EDRs' blind spots☆767Dec 2, 2024Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Dec 16, 2023Updated 2 years ago
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆129Sep 27, 2023Updated 2 years ago
- 🌒 Shell command obfuscation to avoid detection systems☆122Oct 10, 2022Updated 3 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150May 3, 2024Updated last year
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆71Feb 11, 2024Updated 2 years ago
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆592Jun 12, 2024Updated last year
- ☆26Jan 19, 2026Updated last month
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- ☆11Jan 22, 2021Updated 5 years ago
- A dnSpyEx extension for DotNet Universal Patcher.☆12Nov 24, 2023Updated 2 years ago
- Go shellcode loader that combines multiple evasion techniques☆389Jun 21, 2023Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Jun 22, 2024Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆75Jan 3, 2025Updated last year
- Standalone Metasploit-like XOR encoder for shellcode☆50May 12, 2024Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year