Various PoCs and challenges regarding heap userland exploitation
☆54Jun 15, 2018Updated 7 years ago
Alternatives and similar repositories for Linux_Heap_Exploitation_Intro_Series
Users that are interested in Linux_Heap_Exploitation_Intro_Series are comparing it to the libraries listed below
Sorting:
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Aug 15, 2017Updated 8 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- Undefined Behaviour Snippets☆17Apr 3, 2017Updated 8 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- ☆34Sep 22, 2017Updated 8 years ago
- My notes about Genyatyk VM crackme☆26Jun 27, 2020Updated 5 years ago
- System Security Project☆13Feb 28, 2017Updated 9 years ago
- My AddressSanitizer implementation in C☆29Jan 29, 2021Updated 5 years ago
- PoC code for CVE-2017-13253☆37Oct 1, 2020Updated 5 years ago
- Tiny project with that demonstrates how to enable Return Flow Guard☆12Feb 7, 2017Updated 9 years ago
- Stuff related with piracy☆10Oct 7, 2020Updated 5 years ago
- PatchFuzz: Fuzzing for JavaScript Engine Incomplete Security Patches☆19Dec 17, 2025Updated 3 months ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Jul 17, 2018Updated 7 years ago
- Fake Update Website ( On Click Automatic Download Windows Payload )☆11Apr 8, 2020Updated 5 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- RWX CTF Team Writeups☆10Dec 24, 2019Updated 6 years ago
- Collection of IronPython scripts and executables for penetration testing☆57Feb 26, 2019Updated 7 years ago
- ☆13Oct 10, 2018Updated 7 years ago
- ☆72Nov 20, 2017Updated 8 years ago
- Attacking the Core associated source files☆89Dec 13, 2017Updated 8 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- javascript phishing professionel ;redirect victim if he wants to login one paypal or another web site☆12Nov 5, 2020Updated 5 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Feb 11, 2021Updated 5 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- String obfuscation in GO☆14Sep 19, 2019Updated 6 years ago
- Linux Heap Exploitation Practice☆395Dec 1, 2018Updated 7 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆304Jan 12, 2023Updated 3 years ago
- Static analysis tools for x86 assembly☆13Mar 3, 2017Updated 9 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- My Chrome and Safari exploit code + write-up repo☆532Nov 5, 2021Updated 4 years ago
- Analysis of public exploits or my 1day exploits☆617Oct 1, 2020Updated 5 years ago
- ☆15Jul 12, 2020Updated 5 years ago
- rp++ is a full-cpp written tool that aims to find ROP sequences in PE/Elf/Mach-O x86/x64 binaries. It is open-source and has been tested …☆11Apr 2, 2016Updated 9 years ago
- Challenges and vulnerabilities exploitation.☆60Dec 26, 2020Updated 5 years ago