hac425xxx / heap-exploitation-in-real-world
☆284Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for heap-exploitation-in-real-world
- Something about CTF and vulnerability environment, mainly about kernel exploit.☆46Updated 2 years ago
- ☆98Updated 3 years ago
- Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn☆178Updated 3 years ago
- windows debug and exploit toolset for both user and kernel mode☆176Updated 2 months ago
- ☆222Updated 3 years ago
- The best vulnerable driver to learn how to exploit kernel vulnerability.☆28Updated 5 years ago
- won't maintain☆126Updated 5 years ago
- Script to setup pwn environment for CTF with Docker☆148Updated 3 years ago
- Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices,…☆17Updated 7 years ago
- ☆171Updated 5 years ago
- ☆51Updated 10 months ago
- 一些阅读源码和Fuzzing 的经验,涵盖黑盒与白盒测试..☆63Updated 3 years ago
- A plugin to resolve .plt.sec symbols in IDA☆77Updated 3 years ago
- Some Vulnerability in the some protocol are collected.☆94Updated 5 months ago
- ☆103Updated 6 months ago
- ☆50Updated 2 years ago
- Challenge attachments for RWCTF 3rd.☆90Updated 3 years ago
- Corpus of public v8 vulnerability PoCs.☆209Updated 3 years ago
- Debug pwn in docker, no need for virtual machines☆35Updated 2 years ago
- Automatic Exploit Generation Paper☆79Updated 2 years ago
- Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices,…☆47Updated 7 years ago
- ubuntu不同版本的libc以及ld整理☆18Updated 4 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆87Updated 2 years ago
- ☆28Updated 2 years ago
- The learn note of Angr-CTF ..☆49Updated 5 years ago
- A docker environment for pwn in ctf☆21Updated last year
- ctf patching toy☆44Updated this week