Various PoCs and challenges regarding heap userland exploitation
☆54Jun 15, 2018Updated 7 years ago
Alternatives and similar repositories for Linux_Heap_Exploitation_Intro_Series
Users that are interested in Linux_Heap_Exploitation_Intro_Series are comparing it to the libraries listed below
Sorting:
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Aug 15, 2017Updated 8 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- My AddressSanitizer implementation in C☆29Jan 29, 2021Updated 5 years ago
- ☆34Sep 22, 2017Updated 8 years ago
- PoC code for CVE-2017-13253☆37Oct 1, 2020Updated 5 years ago
- System Security Project☆13Feb 28, 2017Updated 9 years ago
- Undefined Behaviour Snippets☆17Apr 3, 2017Updated 8 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Jul 17, 2018Updated 7 years ago
- Attacking the Core associated source files☆89Dec 13, 2017Updated 8 years ago
- ☆72Nov 20, 2017Updated 8 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Apr 29, 2018Updated 7 years ago
- List of Red Team Repositories☆17Feb 26, 2019Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- Dexaran's Naming Service☆20Mar 22, 2023Updated 2 years ago
- A program to draw rectangles from heap traces.☆135Feb 27, 2020Updated 6 years ago
- multi_path exploit now with remount for iOS 11.3.X (english version)☆19Jul 4, 2018Updated 7 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- Stuff related with piracy☆10Oct 7, 2020Updated 5 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆44Jan 30, 2021Updated 5 years ago
- ☆34Apr 5, 2017Updated 8 years ago
- Android stuff☆28Jan 12, 2015Updated 11 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Nov 6, 2017Updated 8 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆302Jan 12, 2023Updated 3 years ago
- Homebrew exploit for 3.0.0 (source code, historical purposes)☆65Apr 25, 2018Updated 7 years ago
- This is the Pwn2Own 2017 Safari backup vul's exploit.☆116Mar 25, 2019Updated 6 years ago
- ☆190Oct 25, 2017Updated 8 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Sep 11, 2014Updated 11 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Sep 14, 2017Updated 8 years ago
- My notes about Genyatyk VM crackme☆26Jun 27, 2020Updated 5 years ago
- A PyQt5 frontend to the binjatron plugin for Binary Ninja that includes highlighting features aimed at making it easier for beginners to …☆25Aug 22, 2017Updated 8 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 8 years ago
- Decentralized open source slot game based on Ethereum blockchain☆14Dec 30, 2017Updated 8 years ago