Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap
☆22Aug 15, 2017Updated 8 years ago
Alternatives and similar repositories for painless_intro_ptmalloc2
Users that are interested in painless_intro_ptmalloc2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Various PoCs and challenges regarding heap userland exploitation☆54Jun 15, 2018Updated 7 years ago
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Nov 29, 2016Updated 9 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Apr 21, 2017Updated 8 years ago
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago
- ☆49Feb 16, 2018Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- LD_PRELOAD hook to trace malloc and free☆45Dec 31, 2017Updated 8 years ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- a new cfi mechanism☆33Sep 23, 2021Updated 4 years ago
- A guided tour of docker basics☆24Nov 2, 2017Updated 8 years ago
- Z3 Symbolic Execution python☆28Dec 28, 2017Updated 8 years ago
- Wrap radamsa on OSX, add instrumentation / triage.☆15Apr 22, 2016Updated 9 years ago
- A simple script for plotting the flight path of aircraft from ADS-B packet data☆12Jan 25, 2018Updated 8 years ago
- Exploitation on ARM-based Systems (Troopers18)☆150Mar 21, 2018Updated 8 years ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Jun 26, 2018Updated 7 years ago
- Secure Virtual Architecture☆42Apr 12, 2019Updated 6 years ago
- Memory inspection REPL interface☆45Oct 14, 2017Updated 8 years ago
- MSP430 Microcontroller CPU plugin for Hopper Disassembler☆12May 13, 2017Updated 8 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- My AddressSanitizer implementation in C☆29Jan 29, 2021Updated 5 years ago
- ROP Wargame repository☆27Sep 11, 2017Updated 8 years ago
- Visualize IonMonkey CFGs using GraphViz.☆51Dec 12, 2019Updated 6 years ago
- Linux kASLR (Intel TSX/RTM) bypass static library☆79Oct 15, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- GrSecurity and PaX Patches Before End of Public Release☆64Jun 26, 2018Updated 7 years ago
- Tools made for Tizen Security Analysis☆14Jun 2, 2015Updated 10 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆44Jan 30, 2021Updated 5 years ago
- Browser Automation & Webpage Performance Testing☆13Dec 6, 2022Updated 3 years ago
- Plugin for BinaryNinja that provides bookmarking functionality☆21Feb 11, 2021Updated 5 years ago
- ☆19Dec 28, 2021Updated 4 years ago
- (Unofficial) Ruby wrapper for the Bugcrowd HTTP API☆14Feb 27, 2017Updated 9 years ago
- A set of tools based on radare2 for analysis of ROP gadgets and payloads.☆15Apr 20, 2016Updated 9 years ago
- ☆91Jul 31, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Scripts and auxiliary files for fuzzing PHP's unserialize function☆46Aug 13, 2017Updated 8 years ago
- Disassemble V8 Ignition bytecode.☆12Jan 2, 2024Updated 2 years ago
- Run your Binary Ninja Python console in a separate Terminal window.☆18Nov 1, 2018Updated 7 years ago
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 10 years ago
- Greybox fuzzer for optimizing function coverage and finding low-level vulnerabilities in C programs☆38Feb 22, 2019Updated 7 years ago
- ☆28Jan 27, 2017Updated 9 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Jun 30, 2017Updated 8 years ago