n132 / Libc-GOT-HijackingView external linksLinks
Binary Exploitation Skill. Gain RCE from arbitrary write.
☆244Dec 23, 2024Updated last year
Alternatives and similar repositories for Libc-GOT-Hijacking
Users that are interested in Libc-GOT-Hijacking are comparing it to the libraries listed below
Sorting:
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- GEF - GDB Enhanced Features - bata24's fork☆611Updated this week
- ☆21Apr 6, 2025Updated 10 months ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆101Jan 13, 2026Updated last month
- attachments and (some) writeups/source code for RWCTF 6th☆125Feb 2, 2024Updated 2 years ago
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 3 months ago
- ☆270Aug 2, 2025Updated 6 months ago
- kernel-pwn and writeup collection☆693Oct 2, 2023Updated 2 years ago
- a new class of file structure attacks☆58Nov 19, 2022Updated 3 years ago
- Do pwn by command line☆416Apr 27, 2025Updated 9 months ago
- ☆40Feb 3, 2026Updated last week
- SCTF 2023 kernel pwn && CVE-2023-3640☆29Jul 17, 2023Updated 2 years ago
- A tool combining DWARF info and source to search for kernel heap objects☆24Dec 23, 2025Updated last month
- Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn☆188Dec 25, 2020Updated 5 years ago
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆69Nov 13, 2025Updated 3 months ago
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Jul 2, 2025Updated 7 months ago
- A gdb plugin for linux kernel.☆28Jul 14, 2023Updated 2 years ago
- IDA/Binary Ninja Plugin to automatically identify and set enums for standard functions☆488Oct 11, 2025Updated 4 months ago
- Exploit for Real World CTF 6th RIPTC.☆33Jan 31, 2024Updated 2 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆101Apr 5, 2022Updated 3 years ago
- ☆189Feb 8, 2025Updated last year
- ☆390Oct 2, 2022Updated 3 years ago
- Automatic use of House of Some & House of Illusion.☆84Sep 9, 2025Updated 5 months ago
- My browser pwn collections. Mainly JavaScript engine stuff.☆33Jan 27, 2025Updated last year
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,277Jan 29, 2026Updated 2 weeks ago
- ☆130May 15, 2025Updated 8 months ago
- various docs (that are interesting, or not, depending on the point of view...)☆138Dec 31, 2023Updated 2 years ago
- ☆35Apr 14, 2025Updated 10 months ago
- basic amd64 alphanumeric shellcode encoder☆200Jan 15, 2024Updated 2 years ago
- A V8 Sandbox Escape Technique.☆33Jul 4, 2024Updated last year
- jqctf2023☆16Dec 3, 2023Updated 2 years ago
- ☆298Jun 21, 2022Updated 3 years ago
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆51Jul 3, 2022Updated 3 years ago
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆749Jan 27, 2026Updated 2 weeks ago
- Pwntools Extension with No Extra Effort!☆15Jun 29, 2025Updated 7 months ago
- 零基础入门V8引擎漏洞挖掘☆281Apr 8, 2024Updated last year
- SAEG: Stateful Automatic Exploit Generation, an AEG framework for CGC / RHG and pwnable CTF challenges.☆175Jan 1, 2025Updated last year
- Source code for the DEF CON 31 CTF Qualifiers.☆127Jun 9, 2023Updated 2 years ago