An attempt to learn glibc heap.
☆44Apr 17, 2020Updated 5 years ago
Alternatives and similar repositories for Heap-Tutorials
Users that are interested in Heap-Tutorials are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IDA MIPS静态扫描脚本,汇编审计辅助脚本☆17Dec 18, 2020Updated 5 years ago
- 适用AWD-WEB的各种场景下的攻击框架。☆22May 26, 2023Updated 2 years ago
- 🔍 LibcSearcher-ng -- get symbols' offset in glibc.☆114Jan 30, 2023Updated 3 years ago
- Muti-threading version of Finger☆32Apr 8, 2024Updated last year
- Script to setup pwn environment with Docker☆49Jan 10, 2026Updated 2 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices,…☆17Jun 20, 2017Updated 8 years ago
- ☆31Sep 4, 2022Updated 3 years ago
- Alphanumeric shellcode encoder.☆173Apr 1, 2016Updated 9 years ago
- 🎁A convenient glibc binary and debug file downloader and source code auto builder☆790Oct 22, 2025Updated 5 months ago
- gdb for pwn☆967Aug 29, 2025Updated 6 months ago
- Python Bytecode Obfuscation☆14Aug 21, 2023Updated 2 years ago
- 计算自身md5的最小ELF64程序.The minimum ELF64 program to calculate its own md5☆11Apr 20, 2020Updated 5 years ago
- 可以方便地部署一个或者多个pwn题到一个docker容器中(使用chroot,并可以设置是否使用我自己写的catflag程序替换默认的/bin/sh程序,以增加安全性)☆242Nov 25, 2021Updated 4 years ago
- Scrapy spider to recursively crawl for TOR hidden services☆11Oct 12, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 毕业设计 C-V2X漏洞挖掘 开放资源☆67Jun 15, 2022Updated 3 years ago
- glibc offset search for ctf.☆790Feb 18, 2023Updated 3 years ago
- ☆103Sep 12, 2021Updated 4 years ago
- ☆16Apr 12, 2023Updated 2 years ago
- One command to boot the QEMU system☆37Sep 7, 2022Updated 3 years ago
- Papers related with kernel papers☆13Mar 18, 2023Updated 3 years ago
- Very Simple Fuzzer☆21Jun 12, 2020Updated 5 years ago
- How to Patch / Detour / Hook .NET managed code using DLL injection . TYPE 2 : Target method defined in external DLL☆15Sep 23, 2023Updated 2 years ago
- ☆26Oct 13, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Do pwn by command line☆424Apr 27, 2025Updated 10 months ago
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆102Dec 18, 2023Updated 2 years ago
- idaemu is an IDA Pro Plugin - use for emulating code in IDA Pro.update for ida pro 7.7☆16Nov 9, 2023Updated 2 years ago
- experiment☆11Jan 29, 2021Updated 5 years ago
- ☆115Nov 11, 2023Updated 2 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- IP格式整理脚本☆10Nov 11, 2021Updated 4 years ago
- ☆125May 4, 2024Updated last year
- 国密算法sm1,sm2,sm3,sm4算法源码☆12Feb 19, 2018Updated 8 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆13Sep 22, 2025Updated 6 months ago
- 2021西湖论剑IoT、虚实结合赛后开放资源☆65Mar 18, 2022Updated 4 years ago
- 💖CTF pwn framework.☆341May 3, 2022Updated 3 years ago
- ☆298Jun 21, 2022Updated 3 years ago
- Templates for deploying pwn challenge in ctf☆53Mar 24, 2023Updated 3 years ago
- A docker environment for pwn in ctf☆805Mar 15, 2026Updated last week
- [windows]pe -> shellcode -> shellcodeLoader -> (pe2shellcode go on?)☆78Dec 15, 2021Updated 4 years ago