ropcatalog is a Python tool designed for parsing and analyzing ROP (Return-Oriented Programming) gadgets extracted from rp++ output files. It helps identify, classify, and filter useful ROP gadgets.
It was built during OffSec journey. Primarly for EXP-301 course and then EXP-401. These courses focuses on Windows exploit development.
Designed for simplicity, using pipx for isolation:
pipx install 'git+https://github.com/n3rada/ropcatalog.git'Then, you can use ropcatalog to help you leaf through the gadget catalog:
ropcatalog ~/dump/libeay32IBM019.txtDump gadgets using rp++:
.\rp-win.exe -f "C:\Program Files\ibm\gsk8\lib\N\icc\osslib\libeay32IBM019.dll" --va=0 -r 5 > libeay32IBM019.txtThen, open your catalog with ASLR considerations (--offset) and output unique (-u) addresses in a copy-pastable Python format (-s):
ropcatalog ~/dump/libeay32IBM019.txt -b "\x00\x09\x0a\x0b\x0c\x0d\x20" -u -o -s pythonIf you forgot how to browse your own catalog, use help
Now, you can search for any gadget that copies the stack pointer (ESP) register to another register:

Without offset considerations, you can search inside any module for gadgets that dereference ESI:

Without using the Python copy-paste format, you can search for gadgets that zero EAX:
