πHeap analysis tool for CTF pwn.
β224May 4, 2021Updated 4 years ago
Alternatives and similar repositories for heapinspect
Users that are interested in heapinspect are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- πDynamic memory watcher/tracer/analyzer for CTF pwnβ52Jul 11, 2020Updated 5 years ago
- πCTF pwn framework.β341May 3, 2022Updated 3 years ago
- β227Dec 9, 2020Updated 5 years ago
- IDA Pro plugin to examine the glibc heap, focused on exploit developmentβ769Jul 25, 2022Updated 3 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.β225Sep 16, 2020Updated 5 years ago
- The best tool for finding one gadget RCE in libc.so.6β2,304Mar 5, 2026Updated 2 weeks ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitivesβ158Mar 3, 2021Updated 5 years ago
- To store some CTF_pwn_bins and exploits for self-practiceβ461Nov 27, 2020Updated 5 years ago
- python library to examine ptmalloc (the glibc userland heap implementation)β508May 11, 2021Updated 4 years ago
- gdb for pwnβ967Aug 29, 2025Updated 6 months ago
- binary patching from Pythonβ639Jul 6, 2023Updated 2 years ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.β1,823Jun 8, 2019Updated 6 years ago
- Automatic vulnerability detection and exploit generationβ16Jul 24, 2019Updated 6 years ago
- Challenge attachments for RWCTF 3rd.β91Jul 1, 2021Updated 4 years ago
- Visualization of heap operations.β616Dec 5, 2024Updated last year
- Script to setup pwn environment for CTF with Dockerβ154Sep 9, 2021Updated 4 years ago
- Provide powerful tools for seccomp analysisβ1,098Mar 5, 2026Updated 2 weeks ago
- Linux Heap Exploitation Practiceβ395Dec 1, 2018Updated 7 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.β204Jul 22, 2020Updated 5 years ago
- An interactive memory info for pwning / exploitingβ98Apr 13, 2023Updated 2 years ago
- Build a database of libc offsets to simplify exploitationβ1,858Oct 23, 2024Updated last year
- HeapHopper is a bounded model checking framework for Heap-implementationsβ227Jul 2, 2025Updated 8 months ago
- For Linux binary Exploitationβ847Mar 26, 2018Updated 7 years ago
- official source code of *CTF2019β225May 7, 2019Updated 6 years ago
- πA convenient glibc binary and debug file downloader and source code auto builderβ790Oct 22, 2025Updated 5 months ago
- Some pwn challenges selected for training and education.β388Jun 26, 2023Updated 2 years ago
- This Repository aims at giving a basic idea about Kernel Exploitation.β520Jun 28, 2024Updated last year
- Collection of scripts and writeupsβ321Dec 14, 2021Updated 4 years ago
- Heap exploitation technique bypassing heap ASLRβ49Sep 2, 2019Updated 6 years ago
- Using Intel's PIN tool to solve CTF problemsβ508Apr 12, 2020Updated 5 years ago
- A repository for learning various heap exploitation techniques.β8,530Updated this week
- CTF writeups from Balsnβ472Mar 18, 2022Updated 4 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'β103Nov 24, 2019Updated 6 years ago
- IDAPython / IDC tips and tricksβ38Oct 25, 2022Updated 3 years ago
- The new phuzzing framework!β164Jun 14, 2024Updated last year
- qemu vulnerablity.β55May 25, 2021Updated 4 years ago
- A hyper plugin to provide a flexible GDB GUI frontend with the help of GEF, pwndbg or pedaβ639Apr 28, 2025Updated 10 months ago
- Something about AEGβ272May 29, 2019Updated 6 years ago
- TCACHE (thread local caching in glibc malloc) attack vector common in heap exploitationβ12Apr 6, 2018Updated 7 years ago