Penetration testing commands for Binary Exploitation

Binary exploitation involves identifying and taking advantage of vulnerabilities within compiled binaries. This area covers techniques such as buffer overflows, memory corruption, and exploitation frameworks used to gain unauthorised control over systems.

NameDescriptionPrice
ASLRayTool for ASLR bypass with stack-sprayingFree
heaphopperBounded model checking framework for Heap-implementationsFree
libformatstrLibrary to simplify format string exploitationFree
pwntoolsFramework and exploit development libraryFree
pwntools-rubyFramework and exploit development library, ported onto rubyFree
ROPgadgetFramework for ROP exploitationFree