ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer overflow vulnerabilities, and memory leaks.
☆88May 11, 2024Updated last year
Alternatives and similar repositories for Ropdump
Users that are interested in Ropdump are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated last month
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 11 months ago
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- Zero-dependency MCP server implementation.☆74Feb 23, 2026Updated last month
- This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.☆55Apr 18, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆182Apr 24, 2025Updated 11 months ago
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆131Nov 12, 2023Updated 2 years ago
- 32 bit process inject shellcode to 32 bit process and 64 bit process☆35May 8, 2023Updated 2 years ago
- .NET deserialization hunter☆89Jul 21, 2024Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- Stealthier variation of Module Stomping and Module Overloading injection techniques that reduces memory IoCs. Implemented in Python ctype…☆130Sep 27, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 🌒 Shell command obfuscation to avoid detection systems☆122Oct 10, 2022Updated 3 years ago
- AWS Cloud Landscape Search Engine☆20Nov 29, 2023Updated 2 years ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆179Jun 10, 2024Updated last year
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆497Nov 29, 2022Updated 3 years ago
- Rewrite to fit my needs☆32Jul 20, 2024Updated last year
- Memory Scaner☆65Sep 9, 2022Updated 3 years ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆191Feb 24, 2026Updated last month
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆109Jan 17, 2024Updated 2 years ago
- Perfect DLL Proxying using forwards with absolute paths.☆341Nov 3, 2025Updated 4 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated 2 months ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Go shellcode loader that combines multiple evasion techniques☆388Jun 21, 2023Updated 2 years ago
- Dump Kerberos tickets from the KCM database of SSSD☆56Dec 31, 2025Updated 2 months ago
- ☆114Aug 25, 2023Updated 2 years ago
- .bin file to shellcode convertor☆39Jul 5, 2024Updated last year
- ☆101Oct 7, 2023Updated 2 years ago
- Implementation of sllvm obfuscator☆66Nov 5, 2022Updated 3 years ago
- sigreturn-oriented programming (SROP) based sleep obfuscation poc for Linux☆68Dec 15, 2025Updated 3 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Troll TaskManager, and play with it .☆30Aug 3, 2025Updated 7 months ago
- a tool to help operate in EDRs' blind spots☆769Dec 2, 2024Updated last year
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆592Jun 12, 2024Updated last year
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆72Feb 11, 2024Updated 2 years ago
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- ( 0day ) Local Privilege Escalation in IObit Malware Fighter☆170Mar 30, 2025Updated 11 months ago
- ☆10Jun 16, 2021Updated 4 years ago