Penetration testing commands for Binary Exploitation
Binary exploitation involves identifying and taking advantage of vulnerabilities within compiled binaries. This area covers techniques such as buffer overflows, memory corruption, and exploitation frameworks used to gain unauthorised control over systems.
Name | Description | Price |
---|---|---|
ASLRay | Tool for ASLR bypass with stack-spraying | Free |
heaphopper | Bounded model checking framework for Heap-implementations | Free |
libformatstr | Library to simplify format string exploitation | Free |
pwntools | Framework and exploit development library | Free |
pwntools-ruby | Framework and exploit development library, ported onto ruby | Free |
ROPgadget | Framework for ROP exploitation | Free |