n30m1nd / Linux_Heap_Exploitation_Intro_SeriesLinks
Various PoCs and challenges regarding heap userland exploitation
☆54Updated 7 years ago
Alternatives and similar repositories for Linux_Heap_Exploitation_Intro_Series
Users that are interested in Linux_Heap_Exploitation_Intro_Series are comparing it to the libraries listed below
Sorting:
- Capture The Flag Binary fuzzer for Heap challanges☆41Updated 7 years ago
- ☆43Updated 6 years ago
- ☆99Updated 6 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Attacking the Core associated source files☆89Updated 7 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆91Updated 11 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆85Updated 5 years ago
- exploit development☆49Updated 7 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- PoC for Foxit Reader CVE-2018-14442☆59Updated 6 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- A Python tool to generate ROP chains☆64Updated 6 months ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆56Updated 7 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆51Updated 7 years ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆94Updated 3 years ago
- ☆53Updated 8 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆119Updated 9 months ago
- A repository for my conference presentations☆35Updated 5 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- ☆20Updated 7 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Updated 6 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆91Updated 8 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 7 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Updated 7 years ago
- ☆21Updated 6 years ago
- Workshop material for a Windows Attack Surface Analysis Workshop☆67Updated 6 years ago
- BlazeFox Exploit☆18Updated 6 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 7 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆94Updated 4 years ago