24kimel / theheap
A research paper about the internals of memory management and heap exploitation
☆23Updated 2 years ago
Alternatives and similar repositories for theheap:
Users that are interested in theheap are comparing it to the libraries listed below
- Assembler in C for a project in university☆9Updated last year
- various docs (that are interesting, or not, depending on the point of view...)☆101Updated last year
- An intuitive query API for IDA Pro☆153Updated 3 weeks ago
- random ctf bits☆11Updated 2 months ago
- A collection of themes based on pastel colors, created for reverse engineers☆135Updated last week
- ☆189Updated last year
- Windows Pwnable Study☆330Updated 4 years ago
- Easily debug processes running in docker containers☆22Updated 7 months ago
- All Files, Scripts, and exploits can be found here☆60Updated 3 years ago
- A virtualization-based endpoint security solution for Windows☆86Updated 3 years ago
- Helpful WinDBG command for kernel debugging☆20Updated 4 years ago
- Activate Windows & Office 🔑☆10Updated 7 months ago
- ☆46Updated 6 years ago
- FSOP Again☆18Updated 2 years ago
- IDA/Binary Ninja Plugin to automatically identify and set enums for standard functions☆372Updated 2 weeks ago
- Shell extension for opening executables in IDA☆186Updated last year
- A tool for automating setup of kernel pwn challenges☆53Updated 2 months ago
- Reverse Engineering challenges☆29Updated 4 years ago
- A list of excellent resources for anyone to deepen their understanding with regards to Windows Kernel Exploitation and general low level …☆133Updated 2 years ago
- A tool that is used to hunt vulnerabilities in x64 WDM drivers☆168Updated last year
- ☆143Updated last year
- Hardening code obfuscation against automated attacks☆128Updated last year
- Collection of browser challenges☆121Updated 3 years ago
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆17Updated 2 years ago
- ☆75Updated 8 months ago
- MODeflattener deobfuscates control flow flattened functions obfuscated by OLLVM using Miasm.☆167Updated 3 years ago
- ☆45Updated last year
- ☆10Updated 3 months ago
- Writeups of some Reverse Engineering challenges in CTFs I played☆30Updated 3 years ago
- A bare minimum hypervisor on AMD and Intel processors for learners.☆224Updated last month