ROPgadget Tool Logo

ROPgadget Tool

0
Free
Visit Website

This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF/PE/Mach-O/Raw formats on x86, x64, ARM, ARM64, PowerPC, SPARC, MIPS, RISC-V 64, and RISC-V Compressed architectures. The easiest way to install ROPgadget is from PyPi by running: $ sudo apt install python3-pip $ sudo -H python3 -m pip install ROPgadget $ ROPgadget --help Alternatively, you can install ROPgadget from source. You have to install Capstone first. For Capstone's installation on a nix machine: $ sudo apt install python3-pip $ sudo -H python3 -m pip install capstone Capstone supports multi-platforms (windows, ios, android, cygwin...). For cross-compilation, please refer to the https://github.com/capstone-engine/capstone/blob/master/COMPILE.TXT file. After Capstone is installed, ROPgadget can be used as a standalone tool: $ python3 ROPgadget.py --help Or installed into the Python site-packages library, and executed from $PATH. $ sudo -H python3 setup.py install $ ROPgadget --help Usage: usage: ROPgadget.py [-h] [-v] [-c] [--binary <binary>] [--opcode <opcodes>] [--string <string>] [--memstr <string>] [--depth <nbyte>] [--only <key>] [--filter

FEATURES

ALTERNATIVES

Yaraprocessor allows for scanning data streams in unique ways and dynamic scanning of payloads from network packet captures.

A tool for identifying sensitive secrets in public GitHub repositories

A tool to embed XXE and XSS payloads in various file formats

Malware sandbox for executing malicious files in an isolated environment with advanced features.

A library for running basic functions from stripped binaries cross platform.

A tool for injecting and loading executables with a focus on stealth techniques.

A dataset release policy for the Android Malware Genome Project, requiring authentication and justification for access to the dataset.

Use FindYara, an IDA python plugin, to scan your binary with yara rules and quickly jump to matches.