Rizer0 / RopdumpLinks
ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer overflow vulnerabilities, and memory leaks.
☆86Updated last year
Alternatives and similar repositories for Ropdump
Users that are interested in Ropdump are comparing it to the libraries listed below
Sorting:
- ☆59Updated last year
- PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Iv…☆41Updated 4 months ago
- POC of GITHUB simple C2 in rust☆53Updated 4 months ago
- CVE-2024-30090 - LPE PoC☆107Updated 7 months ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- Make an Linux Kernel rootkit visible again.☆52Updated 3 months ago
- Repo for all my exploits/PoCs☆51Updated 3 weeks ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆109Updated last month
- ☆37Updated 5 months ago
- ☆56Updated 6 months ago
- Attacking the cleanup_module function of a kernel module☆34Updated 2 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆82Updated 3 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- Lena's scripts/code/resources for malware analysis☆27Updated 11 months ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Updated last year
- This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.☆55Updated last year
- Scanner for CVE-2024-4040☆47Updated last year
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆79Updated 3 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 2 months ago
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆95Updated 8 months ago
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- ☆36Updated 6 months ago
- Windows Administrator level Implant.☆49Updated 8 months ago
- ☆40Updated this week
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆111Updated 10 months ago
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Updated 5 months ago
- A tool for analyzing vulnerabilities in JWT tokens. Advanced JWT Vulnerability Scanner & Exploitation Toolkit☆24Updated 2 months ago
- Create Anti-Copy DRM Malware☆57Updated 9 months ago
- ☆55Updated 7 months ago