Automatic ROPChain Generation
☆302Mar 20, 2026Updated this week
Alternatives and similar repositories for exrop
Users that are interested in exrop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ROP Benchmark is a tool to compare ROP compilers☆44Jan 26, 2023Updated 3 years ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆395Jan 15, 2023Updated 3 years ago
- ROPChain generator.☆40Sep 20, 2018Updated 7 years ago
- A framework for static analysis of ROP exploits and programs☆41May 13, 2019Updated 6 years ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13May 13, 2019Updated 6 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- ☆815Mar 6, 2026Updated 2 weeks ago
- symbolic execution plugin for binary ninja☆351Jan 26, 2026Updated last month
- ☆227Dec 9, 2020Updated 5 years ago
- "Pwntools does not support Windows. Use a real OS ;)" — Zach Riggle, 2015☆94Sep 12, 2019Updated 6 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆225Sep 16, 2020Updated 5 years ago
- rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆2,131Sep 14, 2025Updated 6 months ago
- repository for kernel exploit practice☆415Nov 12, 2019Updated 6 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- some useful scripts to solve pwn challenges in ctfs☆13Dec 29, 2020Updated 5 years ago
- Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC☆306Aug 16, 2024Updated last year
- Triton is a dynamic binary analysis library. Build your own program analysis tools, automate your reverse engineering, perform software v…☆4,098Mar 8, 2026Updated 2 weeks ago
- An updated collection of resources targeting browser-exploitation.☆829Mar 8, 2021Updated 5 years ago
- QASan is a custom QEMU 3.1.1 that detects memory errors in the guest using AddressSanitizer.☆351Jul 30, 2024Updated last year
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆860Jun 4, 2020Updated 5 years ago
- IDA 2016 plugin contest winner! Symbolic Execution just one-click away!☆1,617Jun 11, 2025Updated 9 months ago
- Export a binary from ghidra to emulate with unicorn☆27Oct 25, 2019Updated 6 years ago
- ☆153Jan 6, 2019Updated 7 years ago
- ☆11Nov 25, 2020Updated 5 years ago
- Checksec, but for Windows: static detection of security mitigations in executables☆609Jan 13, 2025Updated last year
- UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities☆350Sep 25, 2023Updated 2 years ago
- A Binary Ninja plugin for vulnerability research.☆301Sep 7, 2024Updated last year
- A fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer☆344Aug 23, 2019Updated 6 years ago
- A collection of links related to VMware escape exploits☆1,495Sep 4, 2024Updated last year
- Build your emulation environment as needed☆67Apr 14, 2021Updated 4 years ago
- Something about AEG☆272May 29, 2019Updated 6 years ago
- Linux Heap Exploitation Practice☆395Dec 1, 2018Updated 7 years ago
- Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read☆1,356Feb 21, 2025Updated last year
- ☆202Mar 9, 2023Updated 3 years ago
- A curated list of browser fuzzing researches, papers, tools, ...☆14Jan 30, 2023Updated 3 years ago
- ARG: Automatic ROP chains Generation☆21Jul 18, 2019Updated 6 years ago
- ☆287Apr 23, 2020Updated 5 years ago
- Kernel development & exploitation practice environment.☆251Sep 10, 2023Updated 2 years ago
- SymCC: efficient compiler-based symbolic execution☆862Mar 16, 2026Updated last week