A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap
☆20May 3, 2024Updated last year
Alternatives and similar repositories for BeapOverflow
Users that are interested in BeapOverflow are comparing it to the libraries listed below
Sorting:
- public archive for corCTF 2023☆18Aug 6, 2023Updated 2 years ago
- A general way to Recover Safe linking protected value/pointer☆15Oct 23, 2022Updated 3 years ago
- jqctf2023☆16Dec 3, 2023Updated 2 years ago
- Generate lua call graph☆16Apr 23, 2023Updated 2 years ago
- ☆21Apr 6, 2025Updated 10 months ago
- ☆57Dec 20, 2018Updated 7 years ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆244Dec 23, 2024Updated last year
- is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582)☆13Oct 3, 2024Updated last year
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- ncurses shellcode/instructions tester using unicorn-engine☆13Feb 1, 2025Updated last year
- ropr with some tweaks for better linux kernel support☆37Apr 25, 2025Updated 10 months ago
- RealWorld CTF 5th realwrap challenge☆18May 21, 2023Updated 2 years ago
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 4 months ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆106Jan 13, 2026Updated last month
- ☆29Mar 29, 2023Updated 2 years ago
- ISC2017安全大会☆16Nov 3, 2017Updated 8 years ago
- ☆21Nov 14, 2024Updated last year
- Code Analysis and Semantic Retrieval Library with Smart Strategies☆33Updated this week
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13May 13, 2019Updated 6 years ago
- King-of-the-Hill game for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆15Aug 9, 2023Updated 2 years ago
- Build a database of libc offsets to simplify exploitation☆12Dec 7, 2016Updated 9 years ago
- ☆17Aug 26, 2024Updated last year
- TrustZone Trusted Application 0-Days by Design☆25May 9, 2025Updated 9 months ago
- Vulnerability analyze☆17Sep 21, 2020Updated 5 years ago
- attachments and (some) writeups/source code for RWCTF 6th☆125Feb 2, 2024Updated 2 years ago
- ☆40Feb 3, 2026Updated 3 weeks ago
- 🐣 web3 CTF tool based on web3.py☆45Jan 13, 2026Updated last month
- A fast and powerful gadget finder and ROP chain generator. A research prototype for the ropbot paper accepted at NDSS'26.☆40Jan 22, 2026Updated last month
- CTF-PWN LEARNING MATERIALS☆22Jun 25, 2024Updated last year
- A tool combining DWARF info and source to search for kernel heap objects☆24Dec 23, 2025Updated 2 months ago
- challenges 2024 woohoo☆22Sep 19, 2024Updated last year
- use for unlock research☆25Apr 13, 2023Updated 2 years ago
- The CTF challenges that I made☆18Mar 31, 2023Updated 2 years ago
- ☆28Dec 17, 2025Updated 2 months ago
- the challenge generation framework for pwn.college☆22Nov 19, 2025Updated 3 months ago
- All virtualization escape challenges and writeups in RealWorldCTF☆89Jan 14, 2019Updated 7 years ago
- ☆27Apr 28, 2023Updated 2 years ago
- Protobuf file descriptor extractor☆23Jun 15, 2019Updated 6 years ago