This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF/PE/Mach-O/Raw formats on x86, x64, ARM, ARM64, PowerPC, SPARC, MIPS, RISC-V 64, and RISC-V Compressed architectures. The easiest way to install ROPgadget is from PyPi by running: $ sudo apt install python3-pip $ sudo -H python3 -m pip install ROPgadget $ ROPgadget --help Alternatively, you can install ROPgadget from source. You have to install Capstone first. For Capstone's installation on a nix machine: $ sudo apt install python3-pip $ sudo -H python3 -m pip install capstone Capstone supports multi-platforms (windows, ios, android, cygwin...). For cross-compilation, please refer to the https://github.com/capstone-engine/capstone/blob/master/COMPILE.TXT file. After Capstone is installed, ROPgadget can be used as a standalone tool: $ python3 ROPgadget.py --help Or installed into the Python site-packages library, and executed from $PATH. $ sudo -H python3 setup.py install $ ROPgadget --help Usage: usage: ROPgadget.py [-h] [-v] [-c] [--binary <binary>] [--opcode <opcodes>] [--string <string>] [--memstr <string>] [--depth <nbyte>] [--only <key>] [--filter
FEATURES
SIMILAR TOOLS
A debugger tool for reverse engineers, crackers, and security analysts, with a user-friendly debugging UI and custom agent support.
Valkyrie is a sophisticated file verdict system that enhances malware detection through behavioral analysis and extensive file feature examination.
A collection of YARA rules for public use, built from intelligence profiles and file work.
A tool for translating Dalvik bytecode to Java bytecode for analyzing Android applications.
A command-line program for finding secrets and sensitive information in textual data and Git history.
A de-obfuscator for M/o/Vfuscator, a notorious obfuscator, designed to reverse the effects of M/o/Vfuscator's obfuscation.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.