24kimel / theheap
A research paper about the internals of memory management and heap exploitation
☆23Updated last year
Related projects ⓘ
Alternatives and complementary repositories for theheap
- Windows Pwnable Study☆322Updated 4 years ago
- list of organizations offering vulnerability research/reverse engineering jobs☆60Updated 3 months ago
- various docs (that are interesting, or not, depending on the point of view...)☆97Updated 10 months ago
- IDA/Binary Ninja Plugin to automatically identify and set enums for standard functions☆346Updated last week
- ☆67Updated 6 months ago
- Reverse Engineering challenges☆26Updated 3 years ago
- Assembler in C for a project in university☆9Updated 10 months ago
- Easily debug processes running in docker containers☆21Updated 4 months ago
- Helpful WinDBG command for kernel debugging☆19Updated 3 years ago
- FSOP Again☆19Updated 2 years ago
- All Files, Scripts, and exploits can be found here☆59Updated 3 years ago
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆16Updated 2 years ago
- ☆180Updated last year
- Collection of browser challenges☆120Updated 3 years ago
- IDA Pro plugin with a rich set of features: decryption, deobfuscation, patching, lib code recognition and various pseudocode transformati…☆118Updated last week
- GEF - GDB Enhanced Features for exploit devs & reversers☆360Updated this week
- 🎁A convenient glibc binary and debug file downloader and source code auto builder☆16Updated 3 months ago
- This repo is aim to compile all Flare-On challenge's binaries. Update: 2014 -2022.☆296Updated last year
- ☆203Updated last year
- ☆157Updated 2 years ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆163Updated 10 months ago
- Static deobfuscator for Themida, WinLicense and Code Virtualizer 3.x's mutation-based obfuscation.☆223Updated 3 months ago
- ☆142Updated 5 months ago
- msdocsviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.☆148Updated 10 months ago
- ☆14Updated 3 weeks ago
- Solutions and writeups for the Flare-On 11 (2024) reverse engineering challenge☆39Updated this week
- ☆45Updated 5 years ago
- compile-time control flow obfuscation using mba☆174Updated last year
- Automatic tool to quickly start a pwn CTF challenge☆38Updated last year
- Kernel development & exploitation practice environment.☆210Updated last year