c4ebt / House-of-RustLinks
The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses.
☆31Updated 4 years ago
Alternatives and similar repositories for House-of-Rust
Users that are interested in House-of-Rust are comparing it to the libraries listed below
Sorting:
- ☆46Updated last year
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- ☆71Updated last year
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆102Updated 3 months ago
- A tool for automating setup of kernel pwn challenges☆55Updated 6 months ago
- Shielder's public proof of concepts collection☆31Updated 9 months ago
- archive of the released challenges from corCTF 2021☆23Updated 3 years ago
- public archive for corCTF 2023☆16Updated last year
- Repo for talk slides & materials☆19Updated 6 months ago
- Exploit for Real World CTF 6th RIPTC.☆33Updated last year
- ☆50Updated 6 years ago
- CTF pwn problem writeup☆39Updated 2 years ago
- Linux & Android Kernel Vulnerability research and exploitation☆41Updated last year
- A V8 Sandbox Escape Technique.☆21Updated 11 months ago
- My Personal Reading lists for CVE Writeups☆34Updated 3 years ago
- reverse engninering & pwn writeup☆24Updated 4 years ago
- Udemy – Linux Heap Exploitation☆43Updated 3 years ago
- Source for challenges from bi0sCTF☆26Updated last year
- Let's get familiar with Windows pwn 😎☆46Updated 5 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆66Updated last year
- ☆60Updated last year
- Set of pre-generated pwn.college challenges☆66Updated 2 years ago
- Use-After-Free in Netfilter nf_tables when processing batch requests CVE-2023-32233☆50Updated last year
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆61Updated 6 months ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- A collection of web browser CTF challenges and solutions.☆26Updated 2 years ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆51Updated 2 years ago
- ☆62Updated last year
- Kernel Read Write Execute☆43Updated 4 months ago