n132 / BeapOverflowLinks
A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap
☆19Updated last year
Alternatives and similar repositories for BeapOverflow
Users that are interested in BeapOverflow are comparing it to the libraries listed below
Sorting:
- attachment and write up for D^3CTF 2023's pwn challenge - d3kcache☆41Updated last year
- linux kernel cross page attack demo module☆31Updated 2 years ago
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆67Updated last month
- Target components for kAFL/Nyx Fuzzer☆35Updated last year
- study https://github.com/n132/Libc-GOT-Hijacking☆15Updated 2 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆34Updated 3 years ago
- ☆41Updated last year
- ☆40Updated 4 months ago
- ☆25Updated last year
- Exploit for Real World CTF 6th RIPTC.☆33Updated last year
- Target components for kAFL/Nyx Fuzzer☆35Updated 4 months ago
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆46Updated 3 years ago
- ☆38Updated last year
- Repo for talk slides & materials☆21Updated last year
- ☆21Updated 8 months ago
- A tool combining DWARF info and source to search for kernel heap objects☆24Updated last year
- ☆66Updated 2 years ago
- qemu vulnerablity.☆53Updated 4 years ago
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆15Updated 10 months ago
- A patched QEMU that exposes an interface for LibAFL-based fuzzers☆86Updated last month
- ☆31Updated 2 years ago
- A Linux Kernel Exploitation C Library☆18Updated last month
- For V8CTF M122☆14Updated last year
- ☆32Updated 2 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆97Updated 3 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Updated 3 years ago
- Repository of the findings found by wtf when fuzzing IDA75.☆86Updated 4 years ago
- ☆58Updated last year
- WinAFL modified for RDP client fuzzing☆20Updated 3 years ago
- public archive for corCTF 2023☆18Updated 2 years ago