5lipper / jeapLinks
jeap, exploit 10 in 0ctf 2016 quals
☆15Updated 9 years ago
Alternatives and similar repositories for jeap
Users that are interested in jeap are comparing it to the libraries listed below
Sorting:
- Example of manipulating Firefox's jemalloc-managed heap☆28Updated 12 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12Updated 8 years ago
- ☆28Updated 3 years ago
- cve-2014-4323 poc☆24Updated 9 years ago
- My CTF writeup☆26Updated 8 years ago
- ☆17Updated 11 years ago
- ☆49Updated 9 years ago
- A demo project for AFL with QEMU Augmented Instrumentation (qai)☆45Updated 8 years ago
- ☆140Updated 8 years ago
- specific fuzzers based on AFL and fuzzing results☆41Updated 8 years ago
- A collection of more than 1000 binary libc files☆89Updated 10 years ago
- A ROP and binary analysis exploit challenge for edurange☆15Updated 10 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- cve2014-3153 exploit for ubuntu x86☆18Updated 10 years ago
- Belluminar 2016 Beijing stuff☆26Updated 9 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆83Updated 8 years ago
- Automatically exported from code.google.com/p/kemufuzzer☆26Updated 10 years ago
- ☆25Updated 7 years ago
- slide and full exploit☆86Updated 4 years ago
- ☆32Updated 7 years ago
- ☆17Updated 6 years ago
- Windows Kernel Dump Analyzer☆15Updated 10 years ago
- ☆27Updated 9 years ago
- Solutions for my 34C3CTF challenges☆21Updated 7 years ago
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆116Updated 6 years ago
- ☆85Updated 5 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- full exploit of pwnfest2016, slide and full text of syscan2017☆165Updated 8 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆58Updated 8 years ago
- ☆40Updated 7 years ago