A shared (dynamic) library that can be transparently injected into different processes to detect memory corruption in glibc heap
☆167May 10, 2018Updated 7 years ago
Alternatives and similar repositories for libdheap
Users that are interested in libdheap are comparing it to the libraries listed below
Sorting:
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,281Oct 7, 2022Updated 3 years ago
- Small tool for generating ropchains using unicorn and z3☆198Feb 22, 2018Updated 8 years ago
- Seeding fuzzers with symbolic execution☆203Oct 20, 2017Updated 8 years ago
- ☆22May 5, 2020Updated 5 years ago
- Some security related notes☆461Aug 13, 2017Updated 8 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- full exploit of pwnfest2016, slide and full text of syscan2017☆165Jun 14, 2017Updated 8 years ago
- WinHeap Explorer repository.☆119Aug 27, 2018Updated 7 years ago
- jemalloc heap exploitation framework☆466Nov 29, 2021Updated 4 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆303Jan 12, 2023Updated 3 years ago
- Linux kASLR (Intel TSX/RTM) bypass static library☆80Oct 15, 2017Updated 8 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆82Sep 10, 2016Updated 9 years ago
- Simple library to spray the Windows Kernel Pool☆110Jan 6, 2020Updated 6 years ago
- ☆386Oct 28, 2019Updated 6 years ago
- Automated Exploit generation with WinDBG☆190Oct 18, 2016Updated 9 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Some kernel fuzzing paper about windows and linux☆255Oct 9, 2017Updated 8 years ago
- add symbols back into a stripped ELF binary (~strip)☆177Aug 8, 2017Updated 8 years ago
- IDA Pro plugin making easier work on BinDiff results☆80Mar 25, 2016Updated 9 years ago
- windows kernel vulnerability found by me☆90Aug 28, 2017Updated 8 years ago
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆116Mar 25, 2019Updated 6 years ago
- History of symbolic execution (as well as SAT/SMT solving, fuzzing, and taint data tracking)☆495Aug 24, 2024Updated last year
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago
- A set of exploitation/reversing aids for IDA☆421Nov 28, 2017Updated 8 years ago
- C++-based shellcode builder☆115Nov 19, 2020Updated 5 years ago
- binary patching from Python☆639Jul 6, 2023Updated 2 years ago
- Uncovering Class Hierarchies in C++ Programs☆127Sep 16, 2022Updated 3 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- Expression generator for WebAssembly☆18Jul 6, 2018Updated 7 years ago
- PEDA-like debugger UI for WinDbg☆206Mar 29, 2024Updated last year
- A linux system call fuzzer using TriforceAFL☆177Feb 28, 2024Updated 2 years ago
- Experiments in trying to find 0-days in numpy☆38Jul 1, 2017Updated 8 years ago
- A list of my CVE's with POCs☆682Dec 15, 2020Updated 5 years ago
- AFL/QEMU fuzzing with full-system emulation.☆640Sep 9, 2018Updated 7 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Nov 18, 2022Updated 3 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆247Oct 1, 2019Updated 6 years ago
- softScheck Cloud Fuzzing Framework☆58Jan 26, 2018Updated 8 years ago
- Code for the USENIX 2017 paper: kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels☆591Jan 10, 2019Updated 7 years ago
- python library to examine ptmalloc (the glibc userland heap implementation)☆507May 11, 2021Updated 4 years ago