πHeap analysis tool for CTF pwn.
β223May 4, 2021Updated 4 years ago
Alternatives and similar repositories for heapinspect
Users that are interested in heapinspect are comparing it to the libraries listed below
Sorting:
- πDynamic memory watcher/tracer/analyzer for CTF pwnβ51Jul 11, 2020Updated 5 years ago
- πCTF pwn framework.β341May 3, 2022Updated 3 years ago
- β228Dec 9, 2020Updated 5 years ago
- IDA Pro plugin to examine the glibc heap, focused on exploit developmentβ765Jul 25, 2022Updated 3 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.β225Sep 16, 2020Updated 5 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitivesβ159Mar 3, 2021Updated 5 years ago
- The best tool for finding one gadget RCE in libc.so.6β2,301Updated this week
- To store some CTF_pwn_bins and exploits for self-practiceβ459Nov 27, 2020Updated 5 years ago
- gdb for pwnβ963Aug 29, 2025Updated 6 months ago
- python library to examine ptmalloc (the glibc userland heap implementation)β507May 11, 2021Updated 4 years ago
- binary patching from Pythonβ639Jul 6, 2023Updated 2 years ago
- Visualization of heap operations.β617Dec 5, 2024Updated last year
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.β1,820Jun 8, 2019Updated 6 years ago
- Challenge attachments for RWCTF 3rd.β91Jul 1, 2021Updated 4 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.β203Jul 22, 2020Updated 5 years ago
- For Linux binary Exploitationβ844Mar 26, 2018Updated 7 years ago
- Provide powerful tools for seccomp analysisβ1,096Updated this week
- Build a database of libc offsets to simplify exploitationβ1,853Oct 23, 2024Updated last year
- Linux Heap Exploitation Practiceβ395Dec 1, 2018Updated 7 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'β103Nov 24, 2019Updated 6 years ago
- The new phuzzing framework!β164Jun 14, 2024Updated last year
- Some pwn challenges selected for training and education.β388Jun 26, 2023Updated 2 years ago
- Using Intel's PIN tool to solve CTF problemsβ507Apr 12, 2020Updated 5 years ago
- Script to setup pwn environment for CTF with Dockerβ154Sep 9, 2021Updated 4 years ago
- Collection of scripts and writeupsβ321Dec 14, 2021Updated 4 years ago
- Automatic vulnerability detection and exploit generationβ16Jul 24, 2019Updated 6 years ago
- A repository for learning various heap exploitation techniques.β8,455Jan 15, 2026Updated last month
- Heap exploitation technique bypassing heap ASLRβ49Sep 2, 2019Updated 6 years ago
- A hyper plugin to provide a flexible GDB GUI frontend with the help of GEF, pwndbg or pedaβ638Apr 28, 2025Updated 10 months ago
- HeapHopper is a bounded model checking framework for Heap-implementationsβ225Jul 2, 2025Updated 8 months ago
- An interactive memory info for pwning / exploitingβ98Apr 13, 2023Updated 2 years ago
- SymQEMU: Compilation-based symbolic execution for binariesβ368May 5, 2025Updated 9 months ago
- This Repository aims at giving a basic idea about Kernel Exploitation.β522Jun 28, 2024Updated last year
- qemu vulnerablity.β55May 25, 2021Updated 4 years ago
- πA convenient glibc binary and debug file downloader and source code auto builderβ781Oct 22, 2025Updated 4 months ago
- Basic pwntools for Windowsβ267Apr 22, 2023Updated 2 years ago
- A tool for finding the one gadget RCE in libcβ76May 30, 2020Updated 5 years ago
- Use angr in the IDA Pro debugger generating a state from the current debug sessionβ282Jul 22, 2020Updated 5 years ago
- CTF writeups from Balsnβ472Mar 18, 2022Updated 3 years ago