Udemy – Linux Heap Exploitation
☆56Jun 14, 2021Updated 4 years ago
Alternatives and similar repositories for HeapLAB
Users that are interested in HeapLAB are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆81Oct 15, 2017Updated 8 years ago
- CSharp4Pentesters☆11Mar 5, 2022Updated 4 years ago
- ncurses shellcode/instructions tester using unicorn-engine☆13Feb 1, 2025Updated last year
- PPID Spoofing☆19Dec 26, 2020Updated 5 years ago
- Free Course Materials for LOL-Pwn☆21May 29, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- public archive for corCTF 2023☆18Aug 6, 2023Updated 2 years ago
- Binary exploitation exercises and scripts☆12Mar 15, 2022Updated 4 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- https://exploit.courses/☆20Apr 14, 2018Updated 8 years ago
- This repository contains official source code and writeups for challenges from World Wide CTF 2024 - https://ctftime.org/event/2572☆12Dec 19, 2024Updated last year
- NCTF 2023 challenges and writeups☆15Dec 30, 2023Updated 2 years ago
- This repository is used to teach you how to exploit basic binary vulnerabilities.☆33Sep 2, 2019Updated 6 years ago
- 🐣 web3 CTF tool based on web3.py☆45Apr 10, 2026Updated 3 weeks ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- FSOP Again☆36Apr 3, 2022Updated 4 years ago
- Yet another CTF writeups repository. PWN and RE tasks☆36May 25, 2020Updated 5 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆25Jun 29, 2021Updated 4 years ago
- Place for random PoCs☆18May 21, 2020Updated 5 years ago
- Very WIP taint analysis for DynamoRIO (ARM)☆21Apr 10, 2018Updated 8 years ago
- Clone of the original project https://sourceforge.net/projects/sqsh/☆14Dec 8, 2023Updated 2 years ago
- Libsearcher improved according to my personal habits.LibcSearcher所启发优化而来的项目优化代码部分逻辑,使在使用更便捷的基础上,添加one_gatge查询功能。☆42Oct 9, 2025Updated 6 months ago
- Challenge files which are deployed in the container for the user☆25May 24, 2024Updated last year
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Prototype Pollution exploits collection☆37Aug 8, 2021Updated 4 years ago
- miniLCTF 2023 Challenges and writeup☆17May 16, 2023Updated 2 years ago
- scu-ctf平台上题目的Writeup☆14Oct 30, 2023Updated 2 years ago
- ctf kernel pwn☆16Mar 21, 2024Updated 2 years ago
- Find command injection and format string bugs in binaries☆16Feb 2, 2024Updated 2 years ago
- Headless Scripts for Ghidra's Headless Analyzer written in Python☆33Sep 21, 2019Updated 6 years ago
- Solutions to crackmes☆19May 22, 2015Updated 10 years ago
- A repo about CTF challenges that I made at several CTF events☆14Mar 20, 2025Updated last year
- Exploit basado en vulnerabilidades criticas Bluetooth (CVE-2023-45866, CVE-2024-21306)☆12Dec 15, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- CTF-PWN LEARNING MATERIALS☆22Jun 25, 2024Updated last year
- NodeJS File Write to RCE on a read-only filesystem using a ROP chain in libuv☆38Oct 13, 2024Updated last year
- Linux kernel module implementation & exploitation (pwn) labs.☆212Jan 26, 2022Updated 4 years ago
- Web Application Attack☆14Dec 16, 2019Updated 6 years ago
- ☆24Sep 10, 2022Updated 3 years ago
- 2019年讯飞开发者大赛应用分类标注赛第一名解决方案☆12Oct 23, 2019Updated 6 years ago
- This repository is a collection of JavaScript gadgets that can be used to bypass XSS mitigations such as Content Security Policy (CSP) an…☆140Feb 4, 2026Updated 2 months ago