c4ebt / House-of-RustView external linksLinks
The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses.
☆34Jan 22, 2021Updated 5 years ago
Alternatives and similar repositories for House-of-Rust
Users that are interested in House-of-Rust are comparing it to the libraries listed below
Sorting:
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- Investigating the bug behind CVE-2021-26708☆28Feb 16, 2021Updated 5 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- ☆12Sep 8, 2020Updated 5 years ago
- Microcorruption CTF☆12Jan 17, 2016Updated 10 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- Repository for dealing with Malloc mangling functions☆12Jun 11, 2020Updated 5 years ago
- Collection of Web3 Audits and Publications by ChainLight of Theori☆14Oct 30, 2023Updated 2 years ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- CVE-2020-27950 exploit☆34Dec 1, 2020Updated 5 years ago
- ☆13Dec 14, 2021Updated 4 years ago
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- PWN Challenge☆11Apr 28, 2022Updated 3 years ago
- INACTIVE - http://mzl.la/ghe-archive - Bugzilla Bug Monitor for JS shell bugs☆19Oct 21, 2019Updated 6 years ago
- A framework for static analysis of ROP exploits and programs☆40May 13, 2019Updated 6 years ago
- Turning Your Computer Into a GPS Tracker With Apple Maps☆18Feb 6, 2024Updated 2 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- My public CTF challenge☆17Aug 25, 2025Updated 5 months ago
- A pwning environment, now on docker!☆18Jul 3, 2021Updated 4 years ago
- ☆72Feb 1, 2024Updated 2 years ago
- Set of pre-generated pwn.college challenges☆68Jan 24, 2023Updated 3 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆47Sep 2, 2023Updated 2 years ago
- CTF pwn problem writeup☆40Apr 23, 2023Updated 2 years ago
- Exploit Firefox Vulnerability☆24May 25, 2020Updated 5 years ago
- pwntools library implementation in c++☆49Apr 11, 2021Updated 4 years ago
- ☆50Mar 21, 2019Updated 6 years ago
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago
- exploit development☆49Mar 14, 2018Updated 7 years ago
- ☆27Feb 6, 2024Updated 2 years ago
- ☆20Jan 25, 2022Updated 4 years ago
- A collection of 1days and solutions to challenges related to v8/chrome I developed☆162Oct 28, 2019Updated 6 years ago
- An introduction course to system exploitation based on pwnable.kr challenges☆22Feb 21, 2025Updated 11 months ago
- ROP Wargame repository☆27Sep 11, 2017Updated 8 years ago
- D2R MapHack☆10Jun 10, 2022Updated 3 years ago
- ☆31Oct 14, 2025Updated 4 months ago
- experimentation/code from Tanguy Dubroca (summer 2019)☆28Aug 10, 2019Updated 6 years ago
- MacOS kernel memory leak (4 bytes)☆30Apr 14, 2020Updated 5 years ago
- ☆26May 10, 2021Updated 4 years ago
- ☆34Aug 28, 2024Updated last year