A research paper about the internals of memory management and heap exploitation
☆27Dec 1, 2022Updated 3 years ago
Alternatives and similar repositories for theheap
Users that are interested in theheap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Heap Exploitation Resources☆23Jun 5, 2023Updated 2 years ago
- 读过的安全文章离线归档 | begin in 2023.11.23☆18Jun 4, 2024Updated last year
- Dump Linux keyrings☆24Jul 15, 2024Updated last year
- A simple backdoor for servers and embedded systems.☆14Oct 1, 2025Updated 5 months ago
- pwn database☆18Jan 6, 2019Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- CVEs for Integrated Dell Remote Access Controller (iDRAC)☆23Mar 22, 2026Updated last week
- ☆85Nov 21, 2024Updated last year
- ☆35Feb 27, 2026Updated last month
- ncurses shellcode/instructions tester using unicorn-engine☆13Feb 1, 2025Updated last year
- Man in the middle for NLA enabled RDP in python☆15Nov 26, 2021Updated 4 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Disable Kernel DMA Protection on Windows 11 via pre-boot DMA attack☆53Aug 18, 2025Updated 7 months ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- ☆16Jan 16, 2026Updated 2 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- TGC is the TCP Gender Changer☆21Jan 3, 2019Updated 7 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- ☆28Jan 27, 2017Updated 9 years ago
- Implementation of Advanced Module Stomping and Heap/Stack Encryption☆10Jul 25, 2023Updated 2 years ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- Spike Fuzzer ( Spike for Archlinux ) && Audits☆11Jul 6, 2019Updated 6 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- public archive for corCTF 2023☆18Aug 6, 2023Updated 2 years ago
- Slides, papers, etc☆33Mar 26, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆15Mar 23, 2026Updated last week
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- ☆30Apr 24, 2019Updated 6 years ago
- Dll hijack -- just one macro☆13Jul 3, 2023Updated 2 years ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- Type 2 Hypervisor for security research supported by AMD-V hardware assisted virtualization☆41Jan 9, 2023Updated 3 years ago
- My attempt at writing an Operating System from scratch☆13Mar 3, 2023Updated 3 years ago
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Shellcode execution via x86 inline assembly based on MSVC syntax☆17Apr 26, 2023Updated 2 years ago
- A fork (and mirror) of the Buffer Overflow Module created by NSF Award No. 0113627☆11Feb 11, 2017Updated 9 years ago
- ☆13Feb 25, 2023Updated 3 years ago
- ☆17Jun 28, 2023Updated 2 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- A WinDbg extension to trace COM interactions☆131Aug 14, 2025Updated 7 months ago
- A solution to create obfuscated download cradles for PowerShell.☆16Aug 1, 2022Updated 3 years ago