24kimel / theheap
A research paper about the internals of memory management and heap exploitation
☆23Updated 2 years ago
Alternatives and similar repositories for theheap:
Users that are interested in theheap are comparing it to the libraries listed below
- An intuitive query API for IDA Pro☆155Updated 2 months ago
- various docs (that are interesting, or not, depending on the point of view...)☆105Updated last year
- Windows Pwnable Study☆333Updated 4 years ago
- Easily debug processes running in docker containers☆22Updated 8 months ago
- Collection of browser challenges☆126Updated 3 years ago
- A tool for automating setup of kernel pwn challenges☆55Updated 3 months ago
- All Files, Scripts, and exploits can be found here☆61Updated 3 years ago
- Reverse Engineering challenges☆31Updated 4 years ago
- ☆11Updated 5 months ago
- Linux & Android Kernel Vulnerability research and exploitation☆37Updated last year
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆183Updated 11 months ago
- ☆168Updated last month
- Shell extension for opening executables in IDA☆186Updated 2 years ago
- ropr with some tweaks for better linux kernel support☆17Updated this week
- IDA/Binary Ninja Plugin to automatically identify and set enums for standard functions☆385Updated last month
- Kernel development & exploitation practice environment.☆221Updated last year
- Assembler in C for a project in university☆8Updated last year
- list of organizations offering vulnerability research/reverse engineering jobs☆61Updated 7 months ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆441Updated this week
- A collection of themes based on pastel colors, created for reverse engineers☆139Updated last month
- ☆197Updated last year
- Targeting Windows Kernel Driver Fuzzer☆161Updated last month
- ☆17Updated last month
- PAWNYABLE!☆206Updated 9 months ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆140Updated 2 years ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆178Updated last week
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆87Updated last year
- Kernel PWN Tooklkit aimed mainly for CTF players☆15Updated 7 months ago
- Writeups for CTFs☆69Updated 2 months ago