Injecting code by recompiling shellcode into a ROP chain.
☆107Apr 21, 2026Updated last week
Alternatives and similar repositories for rophi
Users that are interested in rophi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof-of-concept post-build obfuscator for Unity IL2CPP projects☆39Jan 12, 2025Updated last year
- binary instrumentation, analysis, and patching framework☆105Feb 20, 2026Updated 2 months ago
- vulnerable drivers for windows machines.☆53Apr 17, 2026Updated last week
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆22May 26, 2022Updated 3 years ago
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆25Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A tool to decrypt all Synology encrypted archives (SPK, PAT, ...)☆20Jun 6, 2025Updated 10 months ago
- Type 2 Hypervisor for security research supported by AMD-V hardware assisted virtualization☆41Jan 9, 2023Updated 3 years ago
- Generate Go bindings for shared C libraries.☆18Jul 13, 2024Updated last year
- Pointer encryption library in rust.☆18Apr 13, 2025Updated last year
- Bake shellcode to get malicious.exe☆28Jul 25, 2023Updated 2 years ago
- ☆14May 16, 2023Updated 2 years ago
- A lexer and parser for Sleep☆20Feb 20, 2026Updated 2 months ago
- Kernel Information Disclosure☆35Jan 13, 2026Updated 3 months ago
- chernobog is a Hex-Rays decompiler plugin that defeats Hikari LLVM obfuscation.☆186Mar 31, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆17Sep 25, 2024Updated last year
- ☆23May 24, 2024Updated last year
- Misery Loader to bypass modern EDR solutions☆19Dec 20, 2024Updated last year
- VMT hooking is a technique where you hook one (or more) VMT(Virtual Method Table) entries with a pointer to other function. Thus, when th…☆15May 20, 2020Updated 5 years ago
- Guide on using the PPPwnGo GUI tool☆11Sep 26, 2024Updated last year
- A V8 Sandbox Escape Technique.☆21Feb 8, 2025Updated last year
- ☆30Mar 9, 2024Updated 2 years ago
- Common format for transferring and applying function information across binary analysis tools☆64Nov 5, 2025Updated 5 months ago
- Pseudo-shell for RCE scenarios: tunnels commands via /tmp sockets to a local daemon, keeps context, no bind or reverse shell needed.☆45Jun 12, 2025Updated 10 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption☆93Mar 23, 2023Updated 3 years ago
- adapted guidedhacking's code to work on 64 bit applications and added features☆12Dec 3, 2018Updated 7 years ago
- Simple template for using Remill on Windows/Linux/macos.☆31Mar 24, 2026Updated last month
- A basic Secure Virtual Machine hypervisor☆27Feb 25, 2021Updated 5 years ago
- ☆28Jan 10, 2024Updated 2 years ago
- Native opaque predicate cleaner plugin for Binary Ninja☆46Updated this week
- Secure Hyper-Visor Injector for Easy Anti Cheat, Battleye | that supports amd + intel | Undetected + Active updates☆40Jan 17, 2023Updated 3 years ago
- IDA Taskr is a pure Python library for IDA Pro related parallel computing. It lets you use the power of Qt (built-in to IDA!) and Python'…☆29Feb 3, 2026Updated 2 months ago
- ☆15May 2, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆13Jan 19, 2024Updated 2 years ago
- An IDA plugin which demangles Rust function names☆37Dec 11, 2023Updated 2 years ago
- Analyze secretsdump output and hashcat potfiles to find shared passwords and weak credentials in Active Directory☆37Apr 4, 2026Updated 3 weeks ago
- Simple C++ asar unpacker☆16Nov 10, 2022Updated 3 years ago
- load shellcode without P/D Invoke and VirtualProtect call.☆169Sep 2, 2025Updated 7 months ago
- ☆18Mar 1, 2021Updated 5 years ago
- A Complete Technical Teardown of a State-Grade iOS/macOS Watering-Hole Exploit Chain☆55Mar 9, 2026Updated last month