Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation
☆17Jun 26, 2018Updated 7 years ago
Alternatives and similar repositories for Glibc-Malloc-POCs
Users that are interested in Glibc-Malloc-POCs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python module to help in exploitation of the FILE structure in C☆27Dec 2, 2018Updated 7 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Jan 26, 2019Updated 7 years ago
- WCTF 2019 challenge☆103Jul 9, 2019Updated 6 years ago
- Helps you to pull off a padding oracle attack.☆10Oct 29, 2018Updated 7 years ago
- WCTF 2019 Onsite(Master) Challenge☆54Jul 8, 2019Updated 6 years ago
- HITCON CTF 2018☆46Oct 22, 2018Updated 7 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆103Nov 24, 2019Updated 6 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- differential fault analysis attacks (DFA) against SM4☆17Jun 6, 2024Updated last year
- View Linux perf traces in IDA Pro☆15Nov 18, 2019Updated 6 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆225Sep 16, 2020Updated 5 years ago
- ☆14Sep 26, 2021Updated 4 years ago
- HIT-Computer-Network-Course-notes☆12May 10, 2017Updated 8 years ago
- Archive of Balsn CTF 2019☆26Jan 16, 2020Updated 6 years ago
- A sandbox to protect your pwn challenges being pwned in CTF AWD.☆85Dec 5, 2018Updated 7 years ago
- Symbolic Execution over Falcon IL☆30Mar 13, 2026Updated last week
- QWB 2019 official writeups☆64May 28, 2019Updated 6 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Feb 27, 2018Updated 8 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆158Mar 3, 2021Updated 5 years ago
- Lab To Pratice Web Hacking☆26Jun 14, 2019Updated 6 years ago
- For BurpSuite Plugins☆10Jun 25, 2015Updated 10 years ago
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆12Mar 8, 2022Updated 4 years ago
- Tasteless CTF 2019☆20Nov 6, 2019Updated 6 years ago
- Learning Go Code by Example.☆23Mar 3, 2024Updated 2 years ago
- some kernel exploit challenges and cve analysis☆26Nov 30, 2018Updated 7 years ago
- TokyoWestens CTF 4th 2018 EscapeMe challenge☆89Sep 5, 2018Updated 7 years ago
- A series of dynamic analysis tools for Binary Ninja, built with PyQt and Binjatron☆20Oct 23, 2020Updated 5 years ago
- Adds another code segment to an existing program. Experimental: can take in ELF-compiled stuff.☆19Mar 4, 2016Updated 10 years ago
- Our backup exploitation technique: fuzzing for POVs!☆24Aug 20, 2016Updated 9 years ago
- ☆153Jan 6, 2019Updated 7 years ago
- IDA script for parsing kallsyms☆86Dec 8, 2025Updated 3 months ago
- ☆19Dec 28, 2021Updated 4 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆28Aug 17, 2023Updated 2 years ago
- Some kernel fuzzing paper about windows and linux☆255Oct 9, 2017Updated 8 years ago
- Find package dependencies online☆26Jun 20, 2015Updated 10 years ago
- ctfs-2020☆17Mar 15, 2020Updated 6 years ago
- Run your Binary Ninja Python console in a separate Terminal window.☆18Nov 1, 2018Updated 7 years ago
- share some useful archives about vm and qemu escape exploit.☆583Updated this week