TCACHE (thread local caching in glibc malloc) attack vector common in heap exploitation
☆12Apr 6, 2018Updated 7 years ago
Alternatives and similar repositories for tcache-exploitation
Users that are interested in tcache-exploitation are comparing it to the libraries listed below
Sorting:
- A training course for BambooFox☆25Mar 18, 2016Updated 9 years ago
- ☆55Jul 13, 2015Updated 10 years ago
- Shellcode Spider of Exploit-DB☆11Oct 17, 2017Updated 8 years ago
- AIS3 2017 Binary Exploitation☆38Sep 3, 2017Updated 8 years ago
- Heap exploitation technique bypassing heap ASLR☆49Sep 2, 2019Updated 6 years ago
- This is a PoC for Nimbuspwn, a Linux privilege escalation issue identified by Microsoft☆25May 5, 2022Updated 3 years ago
- My KVM breakout code from my DEFCON/Black Hat 2011 presentation☆35Apr 9, 2014Updated 11 years ago
- Yet another CTF Platform☆22May 24, 2016Updated 9 years ago
- CVE-2022-42889 aka Text4Shell research & PoC☆20Mar 17, 2023Updated 2 years ago
- 33C3 CTF binary challenge☆27Jan 6, 2017Updated 9 years ago
- 🔍Heap analysis tool for CTF pwn.☆223May 4, 2021Updated 4 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- This project presents a fast and efficient technique for recognition of continuous hand gestures with a stationary background from video …☆11Mar 12, 2015Updated 10 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Simple Android voice recognition app☆12Nov 21, 2012Updated 13 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- Pseudo-Intel-CET functionality plugin based on QEMU 8.2.2 plugin system, with minor modifications to QEMU TCG body code to adapt to Glibc…☆14Jun 5, 2024Updated last year
- The artifact for NDSS '25 paper "ASGARD: Protecting On-Device Deep Neural Networks with Virtualization-Based Trusted Execution Environmen…☆14Oct 16, 2025Updated 4 months ago
- Linux kernel source tree☆10Oct 11, 2017Updated 8 years ago
- 整理社团历次宣讲会的课件及文章推荐☆38Nov 27, 2018Updated 7 years ago
- Centos6/7一键清理内核☆10Mar 10, 2020Updated 5 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- ☆13Sep 15, 2024Updated last year
- Dev resources of Harmony☆15Mar 4, 2024Updated 2 years ago
- 最新漏洞收集、复现、漏洞环境☆10Mar 21, 2019Updated 6 years ago
- 基于 DeepSeek AI 与 Web3 实时新闻驱动的智能加密期货交易机器人☆19Oct 29, 2025Updated 4 months ago
- ☆11Oct 17, 2023Updated 2 years ago
- Julia package for finding the longest simple path in a graph.☆14Dec 23, 2023Updated 2 years ago
- Cscope Extension for Code☆13Jan 19, 2026Updated last month
- Public Exploits☆10Apr 6, 2021Updated 4 years ago
- Some Pwn Challenges from winesap.☆14Aug 15, 2019Updated 6 years ago
- Microbenchmarks for x86_64 kernel entry methods☆20Feb 21, 2022Updated 4 years ago
- For our ISSTA'23 paper ACETest: Automated Constraint Extraction for Testing Deep Learning Operators☆13Mar 30, 2024Updated last year
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆10Nov 6, 2022Updated 3 years ago
- Exploit for uTorrent vulnerability CVE-2020-8437 by mavlevin☆11Feb 1, 2026Updated last month
- ☆20Updated this week
- Cloudflare Worker based version of httpbin☆16Nov 12, 2025Updated 3 months ago
- This is a library for stealing browser passwords, crypto stuff, password manager extension stuff, and just general applications too☆11May 10, 2024Updated last year
- AIS3 2020 pre-exam writeup☆10Jun 30, 2020Updated 5 years ago