A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap
☆20May 3, 2024Updated 2 years ago
Alternatives and similar repositories for BeapOverflow
Users that are interested in BeapOverflow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- public archive for corCTF 2023☆18Aug 6, 2023Updated 2 years ago
- A Play Ground for learning Kernel.☆11May 3, 2026Updated 2 weeks ago
- jqctf2023☆16Dec 3, 2023Updated 2 years ago
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- A general way to Recover Safe linking protected value/pointer☆15Oct 23, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Generate lua call graph☆15Apr 23, 2023Updated 3 years ago
- ☆21Apr 6, 2025Updated last year
- All PWN-oriented (X-DEV/RE) CTFs from http://CTFTIME.org (organized in an excel sheet) 2016-2022 CTFs☆11Nov 21, 2022Updated 3 years ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆244Dec 23, 2024Updated last year
- ☆56Dec 20, 2018Updated 7 years ago
- RealWorld CTF 5th realwrap challenge☆18May 21, 2023Updated 2 years ago
- is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582)☆13Oct 3, 2024Updated last year
- ncurses shellcode/instructions tester using unicorn-engine☆13Feb 1, 2025Updated last year
- ropr with some tweaks for better linux kernel support☆41Apr 25, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A fast and powerful gadget finder and ROP chain generator. A research prototype for the ropbot paper accepted at NDSS'26.☆49Jan 22, 2026Updated 3 months ago
- ☆29Mar 29, 2023Updated 3 years ago
- A tool combining DWARF info and source to search for kernel heap objects☆25Dec 23, 2025Updated 4 months ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13May 13, 2019Updated 7 years ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆109Jan 13, 2026Updated 4 months ago
- A Linux Kernel Exploitation C Library☆20Oct 29, 2025Updated 6 months ago
- An authentication bypass using an alternate path or channel in Fortinet product☆14Oct 27, 2022Updated 3 years ago
- Vulnerability analyze☆17Sep 21, 2020Updated 5 years ago
- A more realistic demo of a buffer overflow cause by -ffast-math☆15Sep 10, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Exploit for Real World CTF 6th RIPTC.☆33Jan 31, 2024Updated 2 years ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- CTF-PWN LEARNING MATERIALS☆22Jun 25, 2024Updated last year
- Code Analysis and Semantic Retrieval Library with Smart Strategies☆47Apr 14, 2026Updated last month
- ISC2017安全大会☆16Nov 3, 2017Updated 8 years ago
- All virtualization escape challenges and writeups in RealWorldCTF☆89Jan 14, 2019Updated 7 years ago
- IDA plugin to make classes automatically☆21Oct 31, 2024Updated last year
- use for unlock research☆25Apr 13, 2023Updated 3 years ago
- Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang☆19Aug 9, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A simple CTF platform written in go.☆38Jul 7, 2025Updated 10 months ago
- Challenge repository for the 2023 CSAW CTF Qualifiers☆31Sep 18, 2023Updated 2 years ago
- King-of-the-Hill game for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆15Aug 9, 2023Updated 2 years ago
- Generate Rust Emulators and Disassemblers from Ghidra Sleigh.☆17Jul 18, 2023Updated 2 years ago
- ☆40May 1, 2026Updated 2 weeks ago
- Build a database of libc offsets to simplify exploitation☆12Dec 7, 2016Updated 9 years ago
- ☆29Dec 17, 2025Updated 5 months ago