Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'
☆103Nov 24, 2019Updated 6 years ago
Alternatives and similar repositories for HeapLayout
Users that are interested in HeapLayout are comparing it to the libraries listed below
Sorting:
- HeapHopper is a bounded model checking framework for Heap-implementations☆227Jul 2, 2025Updated 8 months ago
- ☆38Nov 30, 2020Updated 5 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Sep 4, 2019Updated 6 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆158Mar 3, 2021Updated 5 years ago
- ☆13Jun 15, 2023Updated 2 years ago
- An Automated Heap Feng Shui Tool☆18Jun 27, 2022Updated 3 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Repo for FUZE project. I will also publish some Linux kernel LPE exploits for various real world kernel vulnerabilities here. the samples…☆504Sep 7, 2018Updated 7 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Jun 26, 2018Updated 7 years ago
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆57May 4, 2019Updated 6 years ago
- QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing☆655Nov 23, 2022Updated 3 years ago
- Automatic Exploit Generation Paper☆88Dec 12, 2021Updated 4 years ago
- SymGDB - symbolic execution plugin for gdb☆218May 15, 2018Updated 7 years ago
- Something about AEG☆272May 29, 2019Updated 6 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Sep 28, 2018Updated 7 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91May 7, 2024Updated last year
- Tools released in CSS 2019☆38Aug 1, 2019Updated 6 years ago
- ☆14Oct 11, 2017Updated 8 years ago
- The new phuzzing framework!☆164Jun 14, 2024Updated last year
- UAFuzz: Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities☆350Sep 25, 2023Updated 2 years ago
- K-Miner☆75Jun 5, 2019Updated 6 years ago
- History of symbolic execution (as well as SAT/SMT solving, fuzzing, and taint data tracking)☆495Aug 24, 2024Updated last year
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆655Jan 12, 2026Updated 2 months ago
- exploit code for a bpf heap overflow vulnerability☆28Sep 3, 2019Updated 6 years ago
- Automatic vulnerability detection and exploit generation☆16Jul 24, 2019Updated 6 years ago
- jemalloc heap exploitation framework☆466Nov 29, 2021Updated 4 years ago
- ☆815Mar 6, 2026Updated 2 weeks ago
- FuZZan: Efficient Sanitizer Metadata Design for Fuzzing☆125Mar 31, 2021Updated 4 years ago
- 2019 Advent Calendar, vmware pwnables☆50Jul 21, 2020Updated 5 years ago
- A Python extension for managing External Memory Data Structures (EMDs)☆51Aug 26, 2024Updated last year
- ☆81Sep 7, 2023Updated 2 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Feb 27, 2018Updated 8 years ago
- ☆252Mar 13, 2020Updated 6 years ago
- Seeding fuzzers with symbolic execution☆203Oct 20, 2017Updated 8 years ago
- Utilities for generating dynamic traces☆94Mar 24, 2025Updated 11 months ago
- Linux Kernel Exploit, a PoC ( Proof of Concept )☆20Mar 5, 2018Updated 8 years ago
- ☆387Oct 28, 2019Updated 6 years ago
- haze binary fuzzer☆56May 19, 2024Updated last year