andigena / ptmalloc-fanzineView external linksLinks
☆51Mar 23, 2018Updated 7 years ago
Alternatives and similar repositories for ptmalloc-fanzine
Users that are interested in ptmalloc-fanzine are comparing it to the libraries listed below
Sorting:
- Emulator, debugger and compiler for the NDH architecture - Emulator for CTF NDH 2k12☆39Apr 25, 2013Updated 12 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- Idapro cpu for OpenRISC arch☆15Mar 25, 2017Updated 8 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Sep 12, 2019Updated 6 years ago
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- ctf exploit codes or writeups☆160Dec 9, 2024Updated last year
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆90Feb 14, 2019Updated 7 years ago
- Exploit for hardcore pwnable☆35Apr 14, 2019Updated 6 years ago
- Some new commands debug heap for peda☆100Apr 6, 2025Updated 10 months ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Dec 30, 2016Updated 9 years ago
- ☆47Dec 29, 2018Updated 7 years ago
- ☆14Jan 12, 2018Updated 8 years ago
- Collections of patterns for weggli to find nice bugs☆21Nov 30, 2023Updated 2 years ago
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆18Jun 6, 2024Updated last year
- ctfwriteup☆25Mar 27, 2019Updated 6 years ago
- A coverage-guided and memory-detection enabled fuzzer for windows applications.☆32Feb 1, 2021Updated 5 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Dec 19, 2016Updated 9 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- CTF binary exploit code☆37Apr 7, 2019Updated 6 years ago
- IDA script for parsing kallsyms☆86Dec 8, 2025Updated 2 months ago
- Samsung CTF 2017 Problems. https://sctf.codeground.org☆24Sep 3, 2018Updated 7 years ago
- Heap exploitation technique bypassing heap ASLR☆48Sep 2, 2019Updated 6 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Jul 20, 2019Updated 6 years ago
- ☆19May 23, 2019Updated 6 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- finals-2014☆20Nov 15, 2016Updated 9 years ago
- ctfs write-up☆30Jul 21, 2023Updated 2 years ago
- A pip wrapper around AFL.☆87Apr 12, 2021Updated 4 years ago
- IDA command palette & more (Ctrl+Shift+P, Ctrl+P)☆165Dec 28, 2025Updated last month
- ELF Unstrip Tool☆107Aug 19, 2015Updated 10 years ago
- WCTF 2019 challenge☆103Jul 9, 2019Updated 6 years ago
- ☆28Dec 17, 2025Updated last month
- ☆17May 13, 2019Updated 6 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆156Apr 1, 2018Updated 7 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Nov 18, 2022Updated 3 years ago
- Some kernel exploits☆146Nov 7, 2017Updated 8 years ago
- python library to examine ptmalloc (the glibc userland heap implementation)☆507May 11, 2021Updated 4 years ago