An interactive memory info for pwning / exploiting
☆98Apr 13, 2023Updated 3 years ago
Alternatives and similar repositories for heapinfo
Users that are interested in heapinfo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- Python module to help in exploitation of the FILE structure in C☆27Dec 2, 2018Updated 7 years ago
- Modified from pwndbg. Enhance the UI part for better usage.☆26Jun 14, 2019Updated 6 years ago
- WTF are those magic numbers?!!☆33Dec 20, 2021Updated 4 years ago
- ELF parser library implemented in pure Ruby!☆46Apr 10, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- ☆17May 13, 2019Updated 6 years ago
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- Soruce code, infrastructure and exploits for the 35C3 CTF challenges newphonewhodis and identitytheft☆27Apr 24, 2019Updated 7 years ago
- gdb for pwn☆967Aug 29, 2025Updated 8 months ago
- ctf exploit codes or writeups☆159Dec 9, 2024Updated last year
- Exploits for interesting CTF challenges I have worked on☆63Mar 1, 2017Updated 9 years ago
- Linux Heap Exploitation Practice☆394Dec 1, 2018Updated 7 years ago
- Ruby - pwn tools☆11Nov 7, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 🔍Heap analysis tool for CTF pwn.☆224May 4, 2021Updated 5 years ago
- PEDA-like debugger UI for WinDbg☆207Mar 29, 2024Updated 2 years ago
- ELF Unstrip Tool☆107Aug 19, 2015Updated 10 years ago
- A Return-oriented Programming toolkit☆352May 14, 2017Updated 8 years ago
- ☆31Feb 20, 2022Updated 4 years ago
- Some CTF write up☆257Aug 29, 2025Updated 8 months ago
- Heap exploitation technique bypassing heap ASLR☆49Sep 2, 2019Updated 6 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- python library to examine ptmalloc (the glibc userland heap implementation)☆509May 11, 2021Updated 5 years ago
- A tool to interactively explore the heap of a python process☆25Dec 29, 2020Updated 5 years ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆772Jul 25, 2022Updated 3 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- Linux kernel module implementation & exploitation (pwn) labs.☆212Jan 26, 2022Updated 4 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆224Sep 16, 2020Updated 5 years ago
- My CTF writeup☆26Mar 20, 2017Updated 9 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆46Jun 11, 2022Updated 3 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Collection of scripts and writeups☆321Dec 14, 2021Updated 4 years ago
- 4.05 kernel dumping POC with patches☆13Jun 5, 2018Updated 7 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- The best tool for finding one gadget RCE in libc.so.6☆2,318Apr 21, 2026Updated 2 weeks ago
- 👀Dynamic memory watcher/tracer/analyzer for CTF pwn☆52Jul 11, 2020Updated 5 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆204Jul 22, 2020Updated 5 years ago
- Provide powerful tools for seccomp analysis☆1,112Apr 21, 2026Updated 2 weeks ago