A research paper about the internals of memory management and heap exploitation
☆27Dec 1, 2022Updated 3 years ago
Alternatives and similar repositories for theheap
Users that are interested in theheap are comparing it to the libraries listed below
Sorting:
- Heap Exploitation Resources☆23Jun 5, 2023Updated 2 years ago
- ☆35Feb 27, 2026Updated last week
- ☆33Jan 3, 2023Updated 3 years ago
- ☆84Nov 21, 2024Updated last year
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- ☆13Feb 25, 2023Updated 3 years ago
- Shellcode execution via x86 inline assembly based on MSVC syntax☆17Apr 26, 2023Updated 2 years ago
- Dll hijack -- just one macro☆13Jul 3, 2023Updated 2 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Spike Fuzzer ( Spike for Archlinux ) && Audits☆11Jul 6, 2019Updated 6 years ago
- It provides configurable shortcuts to help make the pre-qual/testing process more efficient.☆11Nov 19, 2022Updated 3 years ago
- 🇸🇮 Slovenian translations - language package for Magento 2☆11May 27, 2018Updated 7 years ago
- A fork (and mirror) of the Buffer Overflow Module created by NSF Award No. 0113627☆11Feb 11, 2017Updated 9 years ago
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated last month
- This extension will allow you to set the default of product custom options☆11Feb 2, 2020Updated 6 years ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- This script reads a text file containing domains, fetches the subdomains from crt.sh☆11May 31, 2023Updated 2 years ago
- Kill Bill Stripe demo☆10Aug 10, 2025Updated 6 months ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- ☆11Feb 12, 2023Updated 3 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- ncurses shellcode/instructions tester using unicorn-engine☆13Feb 1, 2025Updated last year
- A smart card reconnaissance tool able to map out many different kinds of smart cards.☆13Oct 21, 2025Updated 4 months ago
- Python wrapper interacting with MailCow API☆15Oct 5, 2022Updated 3 years ago
- some AV / EDR / analysis studies☆10May 21, 2023Updated 2 years ago
- Using openresty/nginx as a mail proxy. Changed some functions which openresty/nginx does is not as we expected. Using this project you ca…☆13Dec 1, 2021Updated 4 years ago
- Invoice Management System a video series of curated lessons by Max Pronko☆11Apr 28, 2023Updated 2 years ago
- simple http(s) proxy with python based sqlmapapi wrapper☆10Jul 20, 2015Updated 10 years ago
- A C2 Framework developed as an FYP☆12Feb 15, 2026Updated 2 weeks ago
- A Kubernetes monitoring solution with an agent that collects cluster data and a dashboard for visualization.☆28Nov 4, 2025Updated 4 months ago
- ☆12Aug 1, 2023Updated 2 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Jul 25, 2023Updated 2 years ago
- ☆17Jun 28, 2023Updated 2 years ago
- Docker container for HAProxy with transparent proxying☆10Jun 23, 2016Updated 9 years ago
- Disable Kernel DMA Protection on Windows 11 via pre-boot DMA attack☆49Aug 18, 2025Updated 6 months ago
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆11Jul 14, 2023Updated 2 years ago
- 读过的安全文章离线归档 | begin in 2023.11.23☆18Jun 4, 2024Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- Custom Python shellcode encryptor and obfuscator☆14Jul 31, 2025Updated 7 months ago