DrGadgetdr.rer.oec.gadget IDAPython plugin for the Interactive Disassembler <ABANDONED PROJECT>
Stars: ✭ 61 (+60.53%)
Exploit meVery vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)
Stars: ✭ 665 (+1650%)
RopgadgetThis tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format on x86, x64, ARM, ARM64, PowerPC, SPARC and MIPS architectures.
Stars: ✭ 2,908 (+7552.63%)
rop-benchmarkROP Benchmark is a tool to compare ROP compilers
Stars: ✭ 23 (-39.47%)
Exploit-DevelopmentExploit Development - Weaponized Exploit and Proof of Concepts (PoC)
Stars: ✭ 84 (+121.05%)
xgadgetFast, parallel, cross-variant ROP/JOP gadget search for x86/x64 binaries.
Stars: ✭ 33 (-13.16%)
pwnscriptsVery simple script(s) to hasten binary exploit creation
Stars: ✭ 66 (+73.68%)
RopperDisplay information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, ARM/ARM64, MIPS, PowerPC, SPARC64). For disassembly ropper uses the awesome Capstone Framework.
Stars: ✭ 1,218 (+3105.26%)
RopaGUI tool to create ROP chains using the ropper API
Stars: ✭ 151 (+297.37%)
Arm exploitationExploitation on ARM-based Systems (Troopers18)
Stars: ✭ 139 (+265.79%)
roprA blazing fast™ multithreaded ROP Gadget finder. ropper / ropgadget alternative
Stars: ✭ 200 (+426.32%)
readhookRed-team tool to hook libc read syscall with a buffer overflow vulnerability.
Stars: ✭ 31 (-18.42%)
NTU-Computer-Security台大 計算機安全 - Pwn 簡報、影片、作業題目與解法 - Computer Security Fall 2019 @ CSIE NTU Taiwan
Stars: ✭ 293 (+671.05%)
PythonPython Powered Repository
Stars: ✭ 17 (-55.26%)
Hack4Squad💀 A bash hacking and scanning framework.
Stars: ✭ 45 (+18.42%)
inthewilddbHourly updated database of exploit and exploitation reports
Stars: ✭ 127 (+234.21%)
phuzzFind exploitable PHP files by parameter fuzzing and function call tracing
Stars: ✭ 53 (+39.47%)
fastoverflowtkThis Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variables/commands. Payloads can be generated through MSFVENOM or you can use your own ASM files.
Stars: ✭ 16 (-57.89%)
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+268.42%)
PLtools整理一些内网常用渗透小工具
Stars: ✭ 227 (+497.37%)
LBFHAbout All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers
Stars: ✭ 46 (+21.05%)
H Encore 2Fully chained kernel exploit for the PS Vita on firmwares 3.65-3.73
Stars: ✭ 237 (+523.68%)
ExropAutomatic ROPChain Generation
Stars: ✭ 191 (+402.63%)
volana🌒 Shell command obfuscation to avoid detection systems
Stars: ✭ 38 (+0%)
PXXTFFramework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Stars: ✭ 23 (-39.47%)
Ctfsome experience in CTFs
Stars: ✭ 165 (+334.21%)
srcThis is the source of our Return Oriented Programming tool.
Stars: ✭ 14 (-63.16%)
idaropROP database plugin for IDA
Stars: ✭ 26 (-31.58%)
DevBrute-A Password Brute ForcerDevBrute is a Password Brute Forcer, It can Brute Force almost all Social Media Accounts or Any Web Application.
Stars: ✭ 91 (+139.47%)
CandyPotatoPure C++, weaponized, fully automated implementation of RottenPotatoNG
Stars: ✭ 278 (+631.58%)
exploitingExploiting challenges in Linux and Windows
Stars: ✭ 122 (+221.05%)
biscBorrowed Instructions Synthetic Computation
Stars: ✭ 71 (+86.84%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (+97.37%)
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+134.21%)
BFS2019Bluefrost Exploitation Challenge 2019 - Exploit and Writeup
Stars: ✭ 20 (-47.37%)
UniversalropSmall tool for generating ropchains using unicorn and z3
Stars: ✭ 196 (+415.79%)
SubRosaBasic tool to automate backdooring PE files
Stars: ✭ 48 (+26.32%)
PwnshopExploit Development, Reverse Engineering & Cryptography
Stars: ✭ 167 (+339.47%)
JiraffeOne stop place for exploiting Jira instances in your proximity
Stars: ✭ 157 (+313.16%)
UnjailmeA sandbox escape based on the proof-of-concept (CVE-2018-4087) by Rani Idan (Zimperium)
Stars: ✭ 73 (+92.11%)
PwntoolsCTF framework and exploit development library
Stars: ✭ 8,585 (+22492.11%)
EasyropA Python tool to generate ROP chains
Stars: ✭ 54 (+42.11%)
exploitsSome of my public exploits
Stars: ✭ 50 (+31.58%)
BashCollection of bash scripts I wrote to make my life easier or test myself that you may find useful.
Stars: ✭ 19 (-50%)
H EncoreFully chained kernel exploit for the PS Vita on firmwares 3.65-3.68
Stars: ✭ 968 (+2447.37%)
sedoppkitA knockoff social-engineer toolkit
Stars: ✭ 46 (+21.05%)
kahoot-toolsA website for interacting with kahoot games.
Stars: ✭ 63 (+65.79%)
Rprp++ is a full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries. It is open-source and has been tested on several OS: Debian / Windows 8.1 / Mac OSX Lion (10.7.3). Moreover, it is x64 compatible and supports Intel syntax. Standalone executables can also be directly downloaded.
Stars: ✭ 960 (+2426.32%)
OverRideBinary Exploitation and Reverse-Engineering (from assembly into C)
Stars: ✭ 69 (+81.58%)
Rop ToolA tool to help you write binary exploits
Stars: ✭ 590 (+1452.63%)
TrinityTrinity Exploit - Emulator Escape
Stars: ✭ 371 (+876.32%)
linksys-wrt54gExploiting Linksys WRT54G using a vulnerability I found.
Stars: ✭ 31 (-18.42%)
titanmThis repository contains the tools we used in our research on the Google Titan M chip
Stars: ✭ 149 (+292.11%)
Easy Linux PwnA set of Linux binary exploitation tasks for beginners on various architectures
Stars: ✭ 353 (+828.95%)
CVE-2016-7255An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit
Stars: ✭ 85 (+123.68%)