Capture The Flag Binary fuzzer for Heap challanges
☆40Apr 16, 2018Updated 7 years ago
Alternatives and similar repositories for HeapFuzz
Users that are interested in HeapFuzz are comparing it to the libraries listed below
Sorting:
- A simple Script which tests for LFI (Local File Inclusion) via Curl☆15Mar 11, 2019Updated 6 years ago
- The Ultimate Guide to Pwning☆59Apr 4, 2018Updated 7 years ago
- LFI (Local File Inclusion) Exploitation Tool☆17Jan 4, 2021Updated 5 years ago
- Some stuffs for CODE BLUE 2016☆23Oct 26, 2016Updated 9 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- fofa+xray vul scan golang☆10Sep 19, 2021Updated 4 years ago
- An Android wrapper for Arc☆11May 13, 2018Updated 7 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- "What To" guide for finding vulnerabilities in sites.☆21Jul 22, 2017Updated 8 years ago
- A reimplementation of GNU readelf, using Ryan O'Neill's innovative library, libelfmaster.☆10Sep 28, 2019Updated 6 years ago
- Accepts a domain name and queries multiple sources to return subdomains. Includes option to scan the returned subdomains to check connect…☆14Aug 9, 2019Updated 6 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- A collection of random scripts.☆10Jul 20, 2015Updated 10 years ago
- Python Remote Administration Tool☆14Jan 8, 2017Updated 9 years ago
- The yaml documents for the CTFman search system.☆12May 16, 2019Updated 6 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- ☆16Oct 30, 2022Updated 3 years ago
- Plugin for binary ninja to centralize features useful in static analysis.☆15Mar 3, 2020Updated 6 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago
- x86_64 LKM linux rootkit☆16Jul 1, 2023Updated 2 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- AlMA.PRO.SPY - An open-source Botnet.☆15Jul 25, 2017Updated 8 years ago
- Reverse engineering challenges☆52Nov 3, 2019Updated 6 years ago
- A happy heap editor to support your exploitation process☆198May 6, 2021Updated 4 years ago
- Dumping CTF related code here☆17May 3, 2017Updated 8 years ago
- ☆13Oct 15, 2018Updated 7 years ago
- A LKM (Loadable Kernel Module) to execute a command as root; I include a example of using netcat and a compiled(with source and steps on…☆16Oct 8, 2024Updated last year
- ☆37Nov 16, 2023Updated 2 years ago
- 404 File not found C2 PoC☆32Jul 4, 2016Updated 9 years ago
- My python3 implementation of a Forward Shell☆36Jan 25, 2019Updated 7 years ago
- Linux Heap Exploitation Practice☆395Dec 1, 2018Updated 7 years ago
- cracked password☆20Oct 2, 2013Updated 12 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Oct 10, 2019Updated 6 years ago
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- Resources for the workshop titled "Repacking the unpacker: Applying Time Travel Debugging to malware analysis", given at HackLu 2019☆42Oct 23, 2019Updated 6 years ago
- Exploitation on ARM-based Systems (Troopers18)☆150Mar 21, 2018Updated 7 years ago
- Timeless debugging with symbolic execution and processor trace☆75Jan 23, 2021Updated 5 years ago