Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation
☆17Jun 26, 2018Updated 7 years ago
Alternatives and similar repositories for Glibc-Malloc-POCs
Users that are interested in Glibc-Malloc-POCs are comparing it to the libraries listed below
Sorting:
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Python module to help in exploitation of the FILE structure in C☆27Dec 2, 2018Updated 7 years ago
- Helps you to pull off a padding oracle attack.☆10Oct 29, 2018Updated 7 years ago
- WCTF 2019 challenge☆103Jul 9, 2019Updated 6 years ago
- Archive of Balsn CTF 2019☆26Jan 16, 2020Updated 6 years ago
- ☆14Sep 26, 2021Updated 4 years ago
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆12Mar 8, 2022Updated 3 years ago
- WCTF 2019 Onsite(Master) Challenge☆53Jul 8, 2019Updated 6 years ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)☆61Jan 26, 2019Updated 7 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆103Nov 24, 2019Updated 6 years ago
- View Linux perf traces in IDA Pro☆15Nov 18, 2019Updated 6 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Aug 15, 2017Updated 8 years ago
- Run your Binary Ninja Python console in a separate Terminal window.☆18Nov 1, 2018Updated 7 years ago
- Exploit Firefox Vulnerability☆24May 25, 2020Updated 5 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆225Sep 16, 2020Updated 5 years ago
- A sandbox to protect your pwn challenges being pwned in CTF AWD.☆85Dec 5, 2018Updated 7 years ago
- A series of dynamic analysis tools for Binary Ninja, built with PyQt and Binjatron☆20Oct 23, 2020Updated 5 years ago
- Tasteless CTF 2019☆20Nov 6, 2019Updated 6 years ago
- Learning Go Code by Example.☆23Mar 3, 2024Updated 2 years ago
- ☆19Dec 28, 2021Updated 4 years ago
- Our backup exploitation technique: fuzzing for POVs!☆24Aug 20, 2016Updated 9 years ago
- ctfs-2020☆17Mar 15, 2020Updated 5 years ago
- Adds another code segment to an existing program. Experimental: can take in ELF-compiled stuff.☆19Mar 4, 2016Updated 10 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆29Aug 17, 2023Updated 2 years ago
- GDB plugin to dump SECCOMP rules set via prctnl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER)☆22Mar 13, 2016Updated 9 years ago
- Lab To Pratice Web Hacking☆26Jun 14, 2019Updated 6 years ago
- ☆20Dec 23, 2019Updated 6 years ago
- Symbolic Execution over Falcon IL☆30Aug 28, 2021Updated 4 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆159Mar 3, 2021Updated 5 years ago
- Exploiting Array-Out-of-Bounds-Write-Accesses on Linux☆26Dec 14, 2017Updated 8 years ago
- A library that allows execution of an ELF binary inside a virtual machine without a full-scale operating system☆24Mar 18, 2015Updated 10 years ago
- Personal scripts for binary ninja☆26Jul 24, 2019Updated 6 years ago
- ☆30Dec 26, 2021Updated 4 years ago
- Some kernel fuzzing paper about windows and linux☆255Oct 9, 2017Updated 8 years ago
- some kernel exploit challenges and cve analysis☆26Nov 30, 2018Updated 7 years ago
- A python library to find one-gadget☆30Feb 22, 2019Updated 7 years ago
- Writeups of CTF challenges☆31Sep 30, 2020Updated 5 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Sep 28, 2018Updated 7 years ago