SecurityInnovation / glibc_heap_exploitation_trainingLinks
The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.
☆171Updated last year
Alternatives and similar repositories for glibc_heap_exploitation_training
Users that are interested in glibc_heap_exploitation_training are comparing it to the libraries listed below
Sorting:
- list of organizations offering vulnerability research/reverse engineering jobs☆109Updated 5 months ago
- Binary Exploitation Phrack CTF Challenge☆140Updated 5 months ago
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆88Updated 2 months ago
- All Files, Scripts, and exploits can be found here☆72Updated 4 years ago
- Leveraging patch diffing to discover new vulnerabilities☆138Updated last year
- ASLR bypass without infoleak☆167Updated 4 years ago
- DiffRays is a research-oriented tool for binary patch diffing, designed to aid in vulnerability research, exploit development, and revers…☆282Updated 2 months ago
- The most complete code auditing platform with thousands of real-world challenges☆135Updated 7 months ago
- This repo contains write ups of vulnerabilities I've found and exploits I've publicly developed.☆146Updated 3 years ago
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆84Updated 6 months ago
- Workshop on firmware reverse engineering☆356Updated 4 months ago
- ☆51Updated 4 years ago
- MCP for Pwn☆202Updated last month
- Slides and files for the Reversing Rust Binaries: One step beyond strings workshop at REcon 2024, presented on June 28, 2024.☆81Updated last year
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆96Updated 3 months ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Updated 11 months ago
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆53Updated 2 years ago
- examples of using radius2 to solve reversing challenges☆36Updated last year
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆59Updated 2 years ago
- An educational Bochs-based snapshot fuzzer project☆226Updated 3 months ago
- Binary Exploitation Phrack CTF Challenge☆70Updated 5 months ago
- Scripts to run within Ghidra, maintained by the Trellix ARC team☆127Updated 7 months ago
- Slides and videos from my public speeches / conferences☆82Updated 3 weeks ago
- An automatic Blind ROP exploitation tool☆207Updated 2 years ago
- Easily debug processes running in docker containers☆29Updated last year
- Toolkit to turn Chromium vulnerabilities into full-chain exploits☆263Updated 4 months ago
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆97Updated 7 months ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆69Updated last year
- ☆57Updated last year