An interactive memory info for pwning / exploiting
☆98Apr 13, 2023Updated 2 years ago
Alternatives and similar repositories for heapinfo
Users that are interested in heapinfo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- Python module to help in exploitation of the FILE structure in C☆27Dec 2, 2018Updated 7 years ago
- Modified from pwndbg. Enhance the UI part for better usage.☆26Jun 14, 2019Updated 6 years ago
- WTF are those magic numbers?!!☆33Dec 20, 2021Updated 4 years ago
- ELF parser library implemented in pure Ruby!☆46Nov 1, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- ☆17May 13, 2019Updated 6 years ago
- checksec tool for win10☆25Aug 21, 2017Updated 8 years ago
- Soruce code, infrastructure and exploits for the 35C3 CTF challenges newphonewhodis and identitytheft☆27Apr 24, 2019Updated 6 years ago
- gdb for pwn☆969Aug 29, 2025Updated 7 months ago
- ctf exploit codes or writeups☆159Dec 9, 2024Updated last year
- Exploits for interesting CTF challenges I have worked on☆63Mar 1, 2017Updated 9 years ago
- Linux Heap Exploitation Practice☆395Dec 1, 2018Updated 7 years ago
- Ruby - pwn tools☆11Nov 7, 2015Updated 10 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- PEDA-like debugger UI for WinDbg☆206Mar 29, 2024Updated 2 years ago
- 🔍Heap analysis tool for CTF pwn.☆224May 4, 2021Updated 4 years ago
- ELF Unstrip Tool☆107Aug 19, 2015Updated 10 years ago
- A Return-oriented Programming toolkit☆353May 14, 2017Updated 8 years ago
- ☆31Feb 20, 2022Updated 4 years ago
- Some CTF write up☆256Aug 29, 2025Updated 7 months ago
- Heap exploitation technique bypassing heap ASLR☆49Sep 2, 2019Updated 6 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- python library to examine ptmalloc (the glibc userland heap implementation)☆508May 11, 2021Updated 4 years ago
- A tool to interactively explore the heap of a python process☆25Dec 29, 2020Updated 5 years ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆769Jul 25, 2022Updated 3 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- Linux kernel module implementation & exploitation (pwn) labs.☆210Jan 26, 2022Updated 4 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆225Sep 16, 2020Updated 5 years ago
- My CTF writeup☆26Mar 20, 2017Updated 9 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆46Jun 11, 2022Updated 3 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Collection of scripts and writeups☆321Dec 14, 2021Updated 4 years ago
- 4.05 kernel dumping POC with patches☆13Jun 5, 2018Updated 7 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- The best tool for finding one gadget RCE in libc.so.6☆2,309Mar 5, 2026Updated 3 weeks ago
- 👀Dynamic memory watcher/tracer/analyzer for CTF pwn☆52Jul 11, 2020Updated 5 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆204Jul 22, 2020Updated 5 years ago
- Provide powerful tools for seccomp analysis☆1,101Mar 5, 2026Updated 3 weeks ago