Automatic exploit generation for simple linux pwn challenges.
☆321May 14, 2023Updated 2 years ago
Alternatives and similar repositories for ropstar
Users that are interested in ropstar are comparing it to the libraries listed below
Sorting:
- ☆13Oct 15, 2018Updated 7 years ago
- A small reverse shell for Linux & Windows☆623Jun 5, 2024Updated last year
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,147Sep 10, 2023Updated 2 years ago
- my automatic exploit generation (DEPRECATED)☆60Jun 21, 2016Updated 9 years ago
- 🌯 Give me a web shell, I'll give you a terminal.☆199Dec 29, 2021Updated 4 years ago
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- Build a database of libc offsets to simplify exploitation☆1,854Oct 23, 2024Updated last year
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- Exploit Development, Reverse Engineering & Cryptography☆257Updated this week
- ☆25Jul 7, 2022Updated 3 years ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆395Jan 15, 2023Updated 3 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆225Sep 16, 2020Updated 5 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆820Oct 27, 2023Updated 2 years ago
- Powershell crazy and sometimes diabolic scripts☆161Aug 26, 2020Updated 5 years ago
- Automatic vulnerability detection and exploit generation☆16Jul 24, 2019Updated 6 years ago
- Our team's CTF writeups☆12Jan 15, 2020Updated 6 years ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆179Mar 2, 2023Updated 3 years ago
- ☆809Feb 5, 2026Updated 3 weeks ago
- C# version of Powermad☆170Dec 5, 2023Updated 2 years ago
- The best tool for finding one gadget RCE in libc.so.6☆2,301Updated this week
- the Network Protocol Fuzzer that we will want to use.☆793Jan 29, 2024Updated 2 years ago
- ☆11Mar 26, 2018Updated 7 years ago
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,644Aug 28, 2025Updated 6 months ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆765Jul 25, 2022Updated 3 years ago
- 🔍Heap analysis tool for CTF pwn.☆223May 4, 2021Updated 4 years ago
- A collection of pwn/CTF related utilities for Ghidra☆702Sep 10, 2024Updated last year
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,439Oct 3, 2025Updated 4 months ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆2,098Feb 28, 2025Updated last year
- repository for kernel exploit practice☆415Nov 12, 2019Updated 6 years ago
- ☆17Mar 21, 2019Updated 6 years ago
- A repository for learning various heap exploitation techniques.☆8,455Jan 15, 2026Updated last month
- Improving side channel analysis techniques for CTF problems.☆12Oct 25, 2020Updated 5 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,167Sep 29, 2021Updated 4 years ago
- A hyper plugin to provide a flexible GDB GUI frontend with the help of GEF, pwndbg or peda☆638Apr 28, 2025Updated 10 months ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆225Jul 2, 2025Updated 8 months ago
- Retrieve LAPS password from LDAP☆436Feb 17, 2021Updated 5 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- ☆2,925Feb 8, 2026Updated 3 weeks ago