Automatic exploit generation for simple linux pwn challenges.
☆320May 14, 2023Updated 2 years ago
Alternatives and similar repositories for ropstar
Users that are interested in ropstar are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Oct 15, 2018Updated 7 years ago
- A small reverse shell for Linux & Windows☆640Jun 5, 2024Updated last year
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,144Sep 10, 2023Updated 2 years ago
- Our team's CTF writeups☆11Jan 15, 2020Updated 6 years ago
- my automatic exploit generation (DEPRECATED)☆59Jun 21, 2016Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- 🌯 Give me a web shell, I'll give you a terminal.☆197Dec 29, 2021Updated 4 years ago
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- Automatic vulnerability detection and exploit generation☆16Jul 24, 2019Updated 6 years ago
- Build a database of libc offsets to simplify exploitation☆1,860Oct 23, 2024Updated last year
- ☆17May 13, 2019Updated 6 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆224Sep 16, 2020Updated 5 years ago
- Runs sshd as a unprivileged user for persistence☆10Jun 23, 2019Updated 6 years ago
- ☆826Mar 6, 2026Updated last month
- A py3 script to bruteforce Canary and 2 next 8 values (EBP ' RET)☆11Oct 1, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆397Jan 15, 2023Updated 3 years ago
- Powershell crazy and sometimes diabolic scripts☆161Aug 26, 2020Updated 5 years ago
- Exploit Development, Reverse Engineering & Cryptography☆256Mar 29, 2026Updated last month
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- I am still working on it☆11Apr 30, 2020Updated 6 years ago
- ☆11Mar 26, 2018Updated 8 years ago
- 🔍Heap analysis tool for CTF pwn.☆224May 4, 2021Updated 5 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆820Oct 27, 2023Updated 2 years ago
- ☆25Jul 7, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Something about AEG☆270May 29, 2019Updated 6 years ago
- Yet another implementation of AEG (Automated Exploit Generation) using symbolic execution engine Triton.☆34Jul 29, 2018Updated 7 years ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆180Mar 2, 2023Updated 3 years ago
- C# version of Powermad☆171Dec 5, 2023Updated 2 years ago
- ☆42Jan 19, 2023Updated 3 years ago
- The best tool for finding one gadget RCE in libc.so.6☆2,317Apr 21, 2026Updated last week
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆771Jul 25, 2022Updated 3 years ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆2,118Feb 28, 2025Updated last year
- little helping scripts that I use daily☆11Aug 30, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Monitor linux processes without root permissions☆5,992Mar 1, 2026Updated 2 months ago
- A collection of pwn/CTF related utilities for Ghidra☆704Sep 10, 2024Updated last year
- This Repository aims at giving a basic idea about Kernel Exploitation.☆525Jun 28, 2024Updated last year
- Modular reverse shell server with a Discord frontend and example payloads☆28May 5, 2020Updated 6 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,662Aug 28, 2025Updated 8 months ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,462Mar 11, 2026Updated last month
- the Network Protocol Fuzzer that we will want to use.☆791Jan 29, 2024Updated 2 years ago