Skip to content

n3rada/ropcatalog

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ropcatalog is a Python tool designed for parsing and analyzing ROP (Return-Oriented Programming) gadgets extracted from rp++ output files. It helps identify, classify, and filter useful ROP gadgets.

It was built during OffSec journey. Primarly for EXP-301 course and then EXP-401. These courses focuses on Windows exploit development.

Installation

Designed for simplicity, using pipx for isolation:

pipx install 'git+https://github.com/n3rada/ropcatalog.git'

Then, you can use ropcatalog to help you leaf through the gadget catalog:

ropcatalog ~/dump/libeay32IBM019.txt

Quickstart

Dump gadgets using rp++:

.\rp-win.exe -f "C:\Program Files\ibm\gsk8\lib\N\icc\osslib\libeay32IBM019.dll" --va=0 -r 5 > libeay32IBM019.txt

Then, open your catalog with ASLR considerations (--offset) and output unique (-u) addresses in a copy-pastable Python format (-s):

ropcatalog ~/dump/libeay32IBM019.txt -b "\x00\x09\x0a\x0b\x0c\x0d\x20" -u -o -s python

If you forgot how to browse your own catalog, use help

Now, you can search for any gadget that copies the stack pointer (ESP) register to another register: copy_esp_ASLR

Without offset considerations, you can search inside any module for gadgets that dereference ESI: deref_esi

Without using the Python copy-paste format, you can search for gadgets that zero EAX: zero_eax

About

Finding and classifying ROP gadgets from rp++ output file with some regex and a CLI.

Topics

Resources

License

Stars

Watchers

Forks

Languages