A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap
☆20May 3, 2024Updated last year
Alternatives and similar repositories for BeapOverflow
Users that are interested in BeapOverflow are comparing it to the libraries listed below
Sorting:
- public archive for corCTF 2023☆18Aug 6, 2023Updated 2 years ago
- jqctf2023☆16Dec 3, 2023Updated 2 years ago
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- A general way to Recover Safe linking protected value/pointer☆15Oct 23, 2022Updated 3 years ago
- Generate lua call graph☆16Apr 23, 2023Updated 2 years ago
- ☆21Apr 6, 2025Updated 11 months ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆243Dec 23, 2024Updated last year
- A fast and powerful gadget finder and ROP chain generator. A research prototype for the ropbot paper accepted at NDSS'26.☆48Jan 22, 2026Updated last month
- ☆56Dec 20, 2018Updated 7 years ago
- is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582)☆13Oct 3, 2024Updated last year
- ncurses shellcode/instructions tester using unicorn-engine☆13Feb 1, 2025Updated last year
- ropr with some tweaks for better linux kernel support☆38Apr 25, 2025Updated 10 months ago
- A tool combining DWARF info and source to search for kernel heap objects☆25Dec 23, 2025Updated 2 months ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13May 13, 2019Updated 6 years ago
- ☆17Aug 26, 2024Updated last year
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆107Jan 13, 2026Updated 2 months ago
- challenges 2024 woohoo☆22Sep 19, 2024Updated last year
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 4 months ago
- The CTF challenges that I made☆18Mar 31, 2023Updated 2 years ago
- A repository with UEFI research stuff☆16Jun 23, 2023Updated 2 years ago
- Vulnerability analyze☆17Sep 21, 2020Updated 5 years ago
- A more realistic demo of a buffer overflow cause by -ffast-math☆15Sep 10, 2022Updated 3 years ago
- Exploit for Real World CTF 6th RIPTC.☆33Jan 31, 2024Updated 2 years ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- Code Analysis and Semantic Retrieval Library with Smart Strategies☆34Mar 6, 2026Updated 2 weeks ago
- CTF-PWN LEARNING MATERIALS☆22Jun 25, 2024Updated last year
- ISC2017安全大会☆16Nov 3, 2017Updated 8 years ago
- IDA plugin to make classes automatically☆20Oct 31, 2024Updated last year
- All virtualization escape challenges and writeups in RealWorldCTF☆89Jan 14, 2019Updated 7 years ago
- Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang☆20Aug 9, 2022Updated 3 years ago
- use for unlock research☆25Apr 13, 2023Updated 2 years ago
- A simple CTF platform written in go.☆38Jul 7, 2025Updated 8 months ago
- Challenge repository for the 2023 CSAW CTF Qualifiers☆31Sep 18, 2023Updated 2 years ago
- King-of-the-Hill game for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆15Aug 9, 2023Updated 2 years ago
- Generate Rust Emulators and Disassemblers from Ghidra Sleigh.☆17Jul 18, 2023Updated 2 years ago
- ☆40Feb 3, 2026Updated last month
- ☆28Dec 17, 2025Updated 3 months ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 2 months ago
- VM Escape for Parallels Desktop <18.1.1☆172Mar 15, 2024Updated 2 years ago