one_gadget
MIT๐ฅ Exploitation ยท Ruby
one_gadget is a specialized Ruby tool that locates single-instruction execve gadgets within libc shared libraries, finding code paths that spawn a shell with minimal setup requirements. These one-gadget RCE (Remote Code Execution) addresses dramatically simplify exploit development by replacing complex ROP chains with a single redirect to a pre-existing execve call in libc. CTF competitors and exploit developers use one_gadget to quickly identify the most convenient exploitation primitives in a target's libc version, reducing the time and complexity needed to achieve code execution from a memory corruption vulnerability. The tool analyzes constraint conditions for each gadget, reporting what register or stack states must be satisfied for successful execution, which is critical information for building reliable exploits.
Tags
Details
- Category
- ๐ฅ Exploitation
- Language
- Ruby
- Repository
- david942j/one_gadget
- License
- MIT
- Platforms
- ๐งlinux๐macos
Links
Community Reviews
No reviews yet. Be the first to review one_gadget.
More in Exploitation
Metasploit Framework
RubyThe world's most used penetration testing framework. Exploit development, payload delivery, post-exploitation.
BloodHound
GoActive Directory attack path mapping. Visualizes privilege escalation paths using graph theory.
Impacket
PythonCollection of Python classes for working with network protocols. Essential for Windows/AD pentesting.
CrackMapExec
PythonSwiss army knife for pentesting Active Directory. SMB, LDAP, MSSQL, WinRM enumeration and exploitation.
Evil-WinRM
RubyUltimate WinRM shell for pentesting. Upload/download, in-memory PowerShell, DLL injection, pass-the-hash.
Covenant
C#.NET C2 framework. Collaborative, web-based interface for red team operations and implant management.