24kimel / theheap
A research paper about the internals of memory management and heap exploitation
☆24Updated 2 years ago
Alternatives and similar repositories for theheap:
Users that are interested in theheap are comparing it to the libraries listed below
- various docs (that are interesting, or not, depending on the point of view...)☆113Updated last year
- Windows Pwnable Study☆350Updated 4 years ago
- Assembler in C for a project in university☆8Updated last year
- Easily debug processes running in docker containers☆22Updated 10 months ago
- An intuitive query API for IDA Pro☆155Updated last month
- ☆12Updated 7 months ago
- All Files, Scripts, and exploits can be found here☆64Updated 4 years ago
- IDA/Binary Ninja Plugin to automatically identify and set enums for standard functions☆418Updated 3 months ago
- FSOP Again☆22Updated 3 years ago
- Linux & Android Kernel Vulnerability research and exploitation☆40Updated last year
- list of organizations offering vulnerability research/reverse engineering jobs☆63Updated last month
- Activate Windows & Office 🔑☆10Updated 10 months ago
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to …☆173Updated 2 weeks ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆89Updated 2 years ago
- Reverse Engineering challenges☆32Updated 4 years ago
- ☆11Updated 9 months ago
- ☆175Updated 2 months ago
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆19Updated 2 years ago
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆41Updated last year
- ☆46Updated last year
- ☆90Updated last year
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆197Updated last month
- GEF - GDB Enhanced Features for exploit devs & reversers☆466Updated this week
- Automatic tool to quickly start a pwn CTF challenge☆42Updated last year
- Collection of browser challenges☆130Updated 4 years ago
- ropr with some tweaks for better linux kernel support☆18Updated last week
- A tool for automating setup of kernel pwn challenges☆55Updated 5 months ago
- ☆205Updated this week
- ASLR bypass without infoleak☆160Updated 3 years ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.