A research paper about the internals of memory management and heap exploitation
☆27Dec 1, 2022Updated 3 years ago
Alternatives and similar repositories for theheap
Users that are interested in theheap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- windows rootkit☆60May 2, 2024Updated 2 years ago
- Heap Exploitation Resources☆23Jun 5, 2023Updated 2 years ago
- Pin your 3rd Party Github Actions and Docker Images dependencies.☆16Mar 15, 2025Updated last year
- 读过的安全文章离线归档 | begin in 2023.11.23☆18Jun 4, 2024Updated last year
- Dump Linux keyrings☆24Jul 15, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A simple backdoor for servers and embedded systems.☆14Oct 1, 2025Updated 7 months ago
- ☆33Jan 3, 2023Updated 3 years ago
- CVEs for Integrated Dell Remote Access Controller (iDRAC)☆23May 2, 2026Updated last week
- Here is useful scripts collections. You can forge tickets locally with secret keys or certificates. It's useful when you want backdoor/pe…☆20Apr 6, 2024Updated 2 years ago
- ☆84Nov 21, 2024Updated last year
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- ncurses shellcode/instructions tester using unicorn-engine☆13Feb 1, 2025Updated last year
- Man in the middle for NLA enabled RDP in python☆16Nov 26, 2021Updated 4 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- All PWN-oriented (X-DEV/RE) CTFs from http://CTFTIME.org (organized in an excel sheet) 2016-2022 CTFs☆10Nov 21, 2022Updated 3 years ago
- Guided Differential Fuzzing for HTTP Request Parsing Discrepancies☆20Apr 11, 2024Updated 2 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- ☆16Apr 16, 2026Updated 3 weeks ago
- Disable Kernel DMA Protection on Windows 11 via pre-boot DMA attack☆68Mar 31, 2026Updated last month
- TGC is the TCP Gender Changer