Code execution via corrupting mmap malloc chunks with ASLR bypass
☆51Jul 3, 2022Updated 3 years ago
Alternatives and similar repositories for house-of-muney
Users that are interested in house-of-muney are comparing it to the libraries listed below
Sorting:
- ☆13Dec 14, 2021Updated 4 years ago
- ☆14Jul 1, 2025Updated 8 months ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆243Dec 23, 2024Updated last year
- ☆189Feb 8, 2025Updated last year
- saarCTF infrastructure | Attack-defense CTF gameserver developed by saarsec☆19Feb 2, 2026Updated last month
- Repository for dealing with Malloc mangling functions☆12Jun 11, 2020Updated 5 years ago
- Kernel exploits and writeups☆17May 11, 2022Updated 3 years ago
- Official repository containing files related to N1CTF 2022☆44Nov 11, 2022Updated 3 years ago
- Easily debug processes running in docker containers☆29Jun 22, 2024Updated last year
- SCTF 2023 kernel pwn && CVE-2023-3640☆29Jul 17, 2023Updated 2 years ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆147Jan 23, 2021Updated 5 years ago
- URLProtocolView is a simple Windows utility application that displays all URL protocols that are currently installed on your system.☆14Sep 29, 2022Updated 3 years ago
- gdb plugin for linux kernel to debug slub☆52May 11, 2020Updated 5 years ago
- ASLREKT is a proof of concept for an unfixed generic local ASLR bypass in Linux.☆26Feb 10, 2020Updated 6 years ago
- For V8CTF M122☆14Aug 25, 2024Updated last year
- ☆20Nov 4, 2020Updated 5 years ago
- linux kernel cross page attack demo module☆32Mar 15, 2023Updated 3 years ago
- Linux kernel privilege escalation techniques☆153Aug 9, 2024Updated last year
- SALT - SLUB ALlocator Tracer for the Linux kernel☆156Sep 10, 2018Updated 7 years ago
- ☆176May 2, 2019Updated 6 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago
- Docker file for pwn env. (ubuntu16.04/18.04/18.10)☆10Aug 19, 2021Updated 4 years ago
- ☆70Jul 6, 2023Updated 2 years ago
- Proof of concept code for CVE-2023-2008☆40Jun 12, 2023Updated 2 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆101Apr 5, 2022Updated 3 years ago
- A V8 Sandbox Escape Technique.☆21Feb 8, 2025Updated last year
- attachment and write up for D^3CTF 2023's pwn challenge - d3kcache☆42Jun 28, 2024Updated last year
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆469Apr 13, 2024Updated last year
- ☆22Sep 17, 2019Updated 6 years ago
- PolicyKit CVE-2021-3560 Exploitation (Authentication Agent)☆24Mar 6, 2023Updated 3 years ago
- An IDA processor for eBPF bytecode☆69Nov 7, 2024Updated last year
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- GDB plug-in that helps exploiting the Linux kernel's SLUB allocator☆99Mar 29, 2023Updated 2 years ago
- Explore a live Linux kernel's memory using GDB☆117Oct 20, 2022Updated 3 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆225Sep 16, 2020Updated 5 years ago
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆12Mar 8, 2022Updated 4 years ago
- CTF write-ups by Maple Mallard Magistrates☆45Nov 30, 2024Updated last year
- rpv-web is a browser based frontend for the rpv library☆27Nov 21, 2025Updated 3 months ago