{"id":13648252,"url":"https://github.com/xct/ropstar","last_synced_at":"2025-04-22T07:30:58.896Z","repository":{"id":128989816,"uuid":"200357828","full_name":"xct/ropstar","owner":"xct","description":"Automatic exploit generation for simple linux pwn challenges.","archived":false,"fork":false,"pushed_at":"2023-05-14T10:46:59.000Z","size":69,"stargazers_count":317,"open_issues_count":2,"forks_count":48,"subscribers_count":7,"default_branch":"master","last_synced_at":"2024-11-09T22:38:38.654Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":null,"language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/xct.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null}},"created_at":"2019-08-03T09:37:07.000Z","updated_at":"2024-10-30T05:05:53.000Z","dependencies_parsed_at":"2024-01-07T12:54:36.015Z","dependency_job_id":"cadcd191-849d-46f4-814f-a64867627c81","html_url":"https://github.com/xct/ropstar","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/xct%2Fropstar","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/xct%2Fropstar/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/xct%2Fropstar/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/xct%2Fropstar/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/xct","download_url":"https://codeload.github.com/xct/ropstar/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":250195033,"owners_count":21390230,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-08-02T01:04:05.334Z","updated_at":"2025-04-22T07:30:58.637Z","avatar_url":"https://github.com/xct.png","language":"Python","readme":"# Ropstar\n\nExploits *simple* linux bof challenges involving alsr, nx and to some extend format strings. You can let it get you a shell or specify a win function that is called.\n\n[![asciicast](https://asciinema.org/a/4i9lnxaPirZ6LXygmd1cRQOzT.png)](https://asciinema.org/a/4i9lnxaPirZ6LXygmd1cRQOzT)\n\n## Install\n\n```\nmkvirtualenv sploit\npip install -r requirements.txt\n```\n\n* Requires python3\n* Expects local installation of [libcdatabase](https://github.com/niklasb/libc-database) in /home/user/tools/libcdatabase. To run local exploits make sure you add your local libc to libcdatabase (32-bit \u0026 64-bit versions). Also in \\~/tools you need a clone of [ROPgadget](https://github.com/JonathanSalwan/ROPgadget.git) (used for static binary exploitation).\n\n\n## Examples\n\nExploit local binary:\n```bash\npython ropstar.py \u003cname\u003e\n```\n\nRun remote:\n```bash\npython ropstar.py \u003cname\u003e -rhost \u003caddress\u003e -rport \u003cport\u003e\n```\n\n## Limitations\n\n* a lot, this a just a PoC, expect it to crash on most targets\n* we assume we can write enough bytes to put our payload after the return pointer overwrite - when this is not then case ropstar fails\n\n## Tested on\n\n* Bof (https://github.com/TechSecCTF/pwn_challs)\n* Rop (https://github.com/TechSecCTF/pwn_challs)\n* gimme-your-shell 32-bit \u0026 64-bit (https://github.com/InsecurityAsso/inshack-2019)\n* pwn1, pwn2, pwn3 (https://github.com/mishrasunny174/encrypt-ctf)\n* speedrun-002 (defcon quals 2019, oooverflow.io)\n* ropeasy_updated (https://hackable.ca/)\n* buffer-overflow-1, buffer-overflow-2, gets (https://tcode2k16.github.io/blog/posts/picoctf-2018-writeup/binary-exploitation/#authenticate)\n* Ropemporium: ret2win32\n* various others\n\nHelp on this project is welcome! Contact me on twitter: @xct_de.","funding_links":[],"categories":["Python","Mobile"],"sub_categories":["Linux/ *Nix"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fxct%2Fropstar","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fxct%2Fropstar","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fxct%2Fropstar/lists"}