When playing CTF pwn challenges, the OneGadget tool helps find RCE (remote code execution) gadgets that lead to calling execve('/bin/sh', NULL, NULL). It uses symbolic execution to find the constraints of gadgets to be successful. Installation is available on RubyGems.org, and it supports architectures like i386, amd64, and aarch64. The tool can be used via the command line interface with options to specify the build ID, force file search, output level, and order gadgets by their distance to specific functions or files.
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
A standalone man-in-the-middle attack framework used for phishing login credentials and bypassing 2-factor authentication.
A C#-based Command and Control Framework for remote access and control of compromised systems.
Python Exploit Development Assistance for GDB with enhanced debugging features and commands for exploit development.
A free and open source C2 and proxy for penetration testers
Skyhook facilitates obfuscated HTTP file transfers to bypass IDS detections, enhancing secure data exchange.
Emulate offensive attack techniques in the cloud with a self-contained Go binary.