m1ghtym0 / magic_gadget_finder
Unravels any libcs magic for your ret2libc exploit.
☆80Updated 2 years ago
Alternatives and similar repositories for magic_gadget_finder:
Users that are interested in magic_gadget_finder are comparing it to the libraries listed below
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆52Updated 6 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆89Updated 9 years ago
- Attacking the Core associated source files☆87Updated 7 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- ☆82Updated 7 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆131Updated 5 years ago
- ☆49Updated 7 years ago
- Helper script for working with format string bugs☆57Updated 4 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆87Updated 6 years ago
- WinHeap Explorer repository.☆119Updated 6 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆86Updated 8 years ago
- ☆88Updated 6 years ago
- GlibC Malloc for Exploiters presentation☆146Updated 5 years ago
- ☆100Updated 6 years ago
- Repo for CSAW CTF 2018 Quals challenges☆44Updated 7 years ago
- ☆16Updated 6 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 6 years ago
- A Python tool to generate ROP chains☆60Updated 2 weeks ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆67Updated 6 years ago
- Solutions for my 34C3CTF challenges☆21Updated 6 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆116Updated 3 months ago
- A pip wrapper around AFL.☆84Updated 3 years ago
- various CTF writeups☆60Updated 6 years ago
- Exploits for interesting CTF challenges I have worked on☆64Updated 7 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆132Updated 9 years ago
- ☆91Updated 5 years ago
- Some stuffs for CODE BLUE 2016☆21Updated 8 years ago
- Some kernel exploits☆144Updated 7 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆89Updated 6 years ago
- ☆33Updated 8 years ago