24kimel / theheapLinks
A research paper about the internals of memory management and heap exploitation
☆25Updated 2 years ago
Alternatives and similar repositories for theheap
Users that are interested in theheap are comparing it to the libraries listed below
Sorting:
- Easily debug processes running in docker containers☆22Updated last year
- Windows Pwnable Study☆365Updated last month
- All Files, Scripts, and exploits can be found here☆65Updated 4 years ago
- various docs (that are interesting, or not, depending on the point of view...)☆118Updated last year
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆42Updated last year
- list of organizations offering vulnerability research/reverse engineering jobs☆69Updated 3 months ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆206Updated 3 months ago
- ☆50Updated 6 years ago
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to …☆187Updated last month
- Linux & Android Kernel Vulnerability research and exploitation☆51Updated last year
- FSOP Again☆24Updated 3 years ago
- I will upload challenges I create for various ctf's or educational purposes here.☆24Updated 3 years ago
- Kernel development & exploitation practice environment.☆233Updated last year
- Collection of browser challenges☆137Updated 4 years ago
- ☆13Updated 3 weeks ago
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆21Updated 3 years ago
- Reverse Engineering challenges☆34Updated 4 years ago
- An intuitive query API for IDA Pro☆157Updated 3 months ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆506Updated this week
- Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CV…☆229Updated 2 years ago
- ASLR bypass without infoleak☆162Updated 3 years ago
- ☆19Updated last year
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆444Updated last year
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆337Updated 3 months ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆229Updated 3 years ago
- A tool for automating setup of kernel pwn challenges☆59Updated last month
- ☆100Updated last year
- Collection of pwn techniques☆29Updated 3 years ago
- Write-ups for various CTF☆192Updated last year
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆145Updated 2 years ago