An attempt to learn glibc heap.
☆45Apr 17, 2020Updated 6 years ago
Alternatives and similar repositories for Heap-Tutorials
Users that are interested in Heap-Tutorials are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IDA MIPS静态扫描脚本,汇编审计辅助脚本☆17Dec 18, 2020Updated 5 years ago
- 适用AWD-WEB的各种场景下的攻击框架。☆22May 26, 2023Updated 2 years ago
- 🔍 LibcSearcher-ng -- get symbols' offset in glibc.☆115Jan 30, 2023Updated 3 years ago
- Muti-threading version of Finger☆32Apr 8, 2024Updated 2 years ago
- Causes the program to use the libc we specified.☆17Mar 13, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Script to setup pwn environment with Docker☆49Jan 10, 2026Updated 3 months ago
- Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices,…☆17Jun 20, 2017Updated 8 years ago
- ☆31Sep 4, 2022Updated 3 years ago
- Alphanumeric shellcode encoder.☆175Apr 1, 2016Updated 10 years ago
- 🎁A convenient glibc binary and debug file downloader and source code auto builder☆794Oct 22, 2025Updated 6 months ago
- A tool to locate the base address of arm32-little-end firmware binary. ##ARM固件加载基址定位☆37Feb 6, 2020Updated 6 years ago
- gdb for pwn☆968Aug 29, 2025Updated 8 months ago
- Python Bytecode Obfuscation☆15Aug 21, 2023Updated 2 years ago
- 计算自身md5的最小ELF64程序.The minimum ELF64 program to calculate its own md5☆11Apr 20, 2020Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- 可以方便地部署一个或者多个pwn题到一个docker容器中(使用chroot,并可以设置是否使用我自己写的catflag程序替换默认的/bin/sh程序,以增加安全性)☆242Nov 25, 2021Updated 4 years ago
- moeCTF 2020 Challenges and writeup☆10Oct 28, 2021Updated 4 years ago
- 毕业设计 C-V2X漏洞挖掘 开放资源☆68Jun 15, 2022Updated 3 years ago
- glibc offset search for ctf.☆791Feb 18, 2023Updated 3 years ago
- Using Machine Learning to predict the outcome of a zzuf fuzzing campaign☆23Jun 16, 2015Updated 10 years ago
- ☆102Sep 12, 2021Updated 4 years ago
- ☆16Apr 12, 2023Updated 3 years ago
- One command to boot the QEMU system☆37Sep 7, 2022Updated 3 years ago
- Papers related with kernel papers☆13Mar 18, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Backdoor&后渗透工具☆21Aug 10, 2021Updated 4 years ago
- Very Simple Fuzzer☆21Jun 12, 2020Updated 5 years ago
- How to Patch / Detour / Hook .NET managed code using DLL injection . TYPE 2 : Target method defined in external DLL☆15Sep 23, 2023Updated 2 years ago
- ☆26Oct 13, 2021Updated 4 years ago
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆103Dec 18, 2023Updated 2 years ago
- idaemu is an IDA Pro Plugin - use for emulating code in IDA Pro.update for ida pro 7.7☆16Nov 9, 2023Updated 2 years ago
- experiment☆11Jan 29, 2021Updated 5 years ago
- ☆117Nov 11, 2023Updated 2 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆13Sep 22, 2025Updated 7 months ago
- ☆123May 4, 2024Updated 2 years ago
- 国密算法sm1,sm2,sm3,sm4算法源码☆12Feb 19, 2018Updated 8 years ago
- 💖CTF pwn framework.☆341May 3, 2022Updated 4 years ago
- ☆299Jun 21, 2022Updated 3 years ago
- Templates for deploying pwn challenge in ctf☆55Mar 24, 2023Updated 3 years ago
- A docker environment for pwn in ctf☆803Apr 12, 2026Updated 3 weeks ago