Automatic exploit generation for simple linux pwn challenges.
☆321May 14, 2023Updated 2 years ago
Alternatives and similar repositories for ropstar
Users that are interested in ropstar are comparing it to the libraries listed below
Sorting:
- ☆13Oct 15, 2018Updated 7 years ago
- A small reverse shell for Linux & Windows☆619Jun 5, 2024Updated last year
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,146Sep 10, 2023Updated 2 years ago
- Our team's CTF writeups☆11Jan 15, 2020Updated 6 years ago
- my automatic exploit generation (DEPRECATED)☆59Jun 21, 2016Updated 9 years ago
- 🌯 Give me a web shell, I'll give you a terminal.☆197Dec 29, 2021Updated 4 years ago
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- Automatic vulnerability detection and exploit generation☆16Jul 24, 2019Updated 6 years ago
- Build a database of libc offsets to simplify exploitation☆1,858Oct 23, 2024Updated last year
- ☆17May 13, 2019Updated 6 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆225Sep 16, 2020Updated 5 years ago
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- ☆815Mar 6, 2026Updated 2 weeks ago
- A py3 script to bruteforce Canary and 2 next 8 values (EBP ' RET)☆11Oct 1, 2020Updated 5 years ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆395Jan 15, 2023Updated 3 years ago
- Powershell crazy and sometimes diabolic scripts☆161Aug 26, 2020Updated 5 years ago
- Exploit Development, Reverse Engineering & Cryptography☆256Feb 26, 2026Updated 3 weeks ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- ☆11Mar 26, 2018Updated 7 years ago
- 🔍Heap analysis tool for CTF pwn.☆224May 4, 2021Updated 4 years ago
- ☆25Jul 7, 2022Updated 3 years ago
- Something about AEG☆272May 29, 2019Updated 6 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Jul 29, 2018Updated 7 years ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆179Mar 2, 2023Updated 3 years ago
- C# version of Powermad☆169Dec 5, 2023Updated 2 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆819Oct 27, 2023Updated 2 years ago
- ☆41Jan 19, 2023Updated 3 years ago
- The best tool for finding one gadget RCE in libc.so.6☆2,304Mar 5, 2026Updated 2 weeks ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆769Jul 25, 2022Updated 3 years ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆2,105Feb 28, 2025Updated last year
- little helping scripts that I use daily☆11Aug 30, 2021Updated 4 years ago
- Monitor linux processes without root permissions☆5,927Mar 1, 2026Updated 3 weeks ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆520Jun 28, 2024Updated last year
- A collection of pwn/CTF related utilities for Ghidra☆702Sep 10, 2024Updated last year
- Modular reverse shell server with a Discord frontend and example payloads☆28May 5, 2020Updated 5 years ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,447Mar 11, 2026Updated last week
- Automation for internal Windows Penetrationtest / AD-Security☆3,650Aug 28, 2025Updated 6 months ago
- the Network Protocol Fuzzer that we will want to use.☆793Jan 29, 2024Updated 2 years ago