24kimel / theheapLinks
A research paper about the internals of memory management and heap exploitation
☆25Updated 2 years ago
Alternatives and similar repositories for theheap
Users that are interested in theheap are comparing it to the libraries listed below
Sorting:
- various docs (that are interesting, or not, depending on the point of view...)☆115Updated last year
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆42Updated last year
- An intuitive query API for IDA Pro☆157Updated 2 months ago
- Windows Pwnable Study☆353Updated 4 years ago
- All Files, Scripts, and exploits can be found here☆64Updated 4 years ago
- Assembler in C for a project in university☆8Updated last year
- Collection of browser challenges☆137Updated 4 years ago
- Linux & Android Kernel Vulnerability research and exploitation☆41Updated last year
- list of organizations offering vulnerability research/reverse engineering jobs☆64Updated 2 months ago
- ☆46Updated last year
- Easily debug processes running in docker containers☆22Updated 11 months ago
- ☆50Updated 6 years ago
- FSOP Again☆23Updated 3 years ago
- ☆17Updated 10 months ago
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to …☆185Updated 2 weeks ago
- Write dynamic binary analysis tools in Python☆117Updated 2 weeks ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆199Updated 2 months ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆188Updated last year
- ☆145Updated last year
- A collection of themes based on pastel colors, created for reverse engineers☆146Updated last month
- ☆20Updated this week
- Reverse Engineering challenges☆33Updated 4 years ago
- Helpful WinDBG command for kernel debugging☆23Updated 4 years ago
- Shell extension for opening executables in IDA☆189Updated 2 years ago
- A virtualization-based endpoint security solution for Windows☆86Updated 4 years ago
- A tool for automating setup of kernel pwn challenges☆55Updated 6 months ago
- A simple LKM kernel space rootkit for v5.x linux with multiple functions.☆10Updated 4 years ago
- 🎁A convenient glibc binary and debug file downloader and source code auto builder☆19Updated 4 months ago
- ☆11Updated 8 months ago
- Writeups for CTFs☆69Updated 2 months ago