xgadgetFast, parallel, cross-variant ROP/JOP gadget search for x86/x64 binaries.
Stars: ✭ 33 (-97.29%)
RopaGUI tool to create ROP chains using the ropper API
Stars: ✭ 151 (-87.6%)
Arm exploitationExploitation on ARM-based Systems (Troopers18)
Stars: ✭ 139 (-88.59%)
DrGadgetdr.rer.oec.gadget IDAPython plugin for the Interactive Disassembler <ABANDONED PROJECT>
Stars: ✭ 61 (-94.99%)
Exploit meVery vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)
Stars: ✭ 665 (-45.4%)
roprA blazing fast™ multithreaded ROP Gadget finder. ropper / ropgadget alternative
Stars: ✭ 200 (-83.58%)
Binary ExploitationGood to know, easy to forget information about binaries and their exploitation!
Stars: ✭ 47 (-96.14%)
KarkinosA thorough library database to assist with binary exploitation tasks.
Stars: ✭ 170 (-86.04%)
ROP-EmporiumSolutions for ROP Emporium challenges (https://ropemporium.com/) in python.
Stars: ✭ 38 (-96.88%)
BitsA bite sized library for dealing with bytes.
Stars: ✭ 16 (-98.69%)
Frostyserialize native Nim types to strings, streams, or sockets ⛄
Stars: ✭ 25 (-97.95%)
FoxpwnExploit code for CVE-2016-9066
Stars: ✭ 39 (-96.8%)
EasyropA Python tool to generate ROP chains
Stars: ✭ 54 (-95.57%)
Fsocietyfsociety Hacking Tools Pack – A Penetration Testing Framework
Stars: ✭ 7,224 (+493.1%)
PysploitRemote exploitation framework written in Python
Stars: ✭ 37 (-96.96%)
WindowsAwesome tools to exploit Windows !
Stars: ✭ 816 (-33%)
Shellen🌸 Interactive shellcoding environment to easily craft shellcodes
Stars: ✭ 799 (-34.4%)
ExploitpackExploit Pack -The next generation exploit framework
Stars: ✭ 728 (-40.23%)
Paper collectionAcademic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
Stars: ✭ 710 (-41.71%)
PwinSecurity Evaluation of Dynamic Binary Instrumentation Engines
Stars: ✭ 70 (-94.25%)
ScodecScala combinator library for working with binary data
Stars: ✭ 709 (-41.79%)
H EncoreFully chained kernel exploit for the PS Vita on firmwares 3.65-3.68
Stars: ✭ 968 (-20.53%)
Exploit WriteupsA collection where my current and future writeups for exploits/CTF will go
Stars: ✭ 676 (-44.5%)
RizinUNIX-like reverse engineering framework and command-line toolset.
Stars: ✭ 673 (-44.75%)
Vulnxvulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (-17.16%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (-26.35%)
Next PkgExtended Next.js server with pkg support
Stars: ✭ 55 (-95.48%)
Binary.dartUtilities for working with binary data and bit manipulation in Dart.
Stars: ✭ 16 (-98.69%)
AtscanAdvanced dork Search & Mass Exploit Scanner
Stars: ✭ 817 (-32.92%)
BafBlind Attacking Framework
Stars: ✭ 71 (-94.17%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+536.45%)
Construct Js🛠️A library for creating byte level data structures.
Stars: ✭ 984 (-19.21%)
BinexpLinux Binary Exploitation
Stars: ✭ 742 (-39.08%)
ShcShell script compiler
Stars: ✭ 1,050 (-13.79%)
Lambda PackagesVarious popular python libraries, pre-compiled to be compatible with AWS Lambda
Stars: ✭ 713 (-41.46%)
HammingHamming distance and bit counting primitives in Go (golang)
Stars: ✭ 30 (-97.54%)
GarbleObfuscate Go builds
Stars: ✭ 617 (-49.34%)
Rprp++ is a full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries. It is open-source and has been tested on several OS: Debian / Windows 8.1 / Mac OSX Lion (10.7.3). Moreover, it is x64 compatible and supports Intel syntax. Standalone executables can also be directly downloaded.
Stars: ✭ 960 (-21.18%)
PbfA low-level, lightweight protocol buffers implementation in JavaScript.
Stars: ✭ 618 (-49.26%)
BeeschemaBinary Schema Library for C#
Stars: ✭ 46 (-96.22%)
GoridgeHigh-performance PHP-to-Golang IPC bridge
Stars: ✭ 950 (-22%)
HerpaderpingProcess Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (-49.59%)
AttifyosAttify OS - Distro for pentesting IoT devices
Stars: ✭ 615 (-49.51%)
Rop ToolA tool to help you write binary exploits
Stars: ✭ 590 (-51.56%)
Reenvdotenv-cli implementation in native ReasonML providing near-instant startup times
Stars: ✭ 65 (-94.66%)
BedBinary editor written in Go
Stars: ✭ 1,034 (-15.11%)
Risa simple cross-platform resource compiler for c++ projects
Stars: ✭ 15 (-98.77%)
Cve 2019 11708Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.
Stars: ✭ 581 (-52.3%)
Heap ViewerAn IDA Pro plugin to examine the glibc heap, focused on exploit development
Stars: ✭ 574 (-52.87%)
FeatherdusterAn automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Stars: ✭ 876 (-28.08%)
Damn Vulnerable Graphql ApplicationDamn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security.
Stars: ✭ 567 (-53.45%)
AngrA powerful and user-friendly binary analysis platform!
Stars: ✭ 5,542 (+355.01%)
Write Ups📚 VoidHack CTF write-ups
Stars: ✭ 45 (-96.31%)