n30m1nd / painless_intro_ptmalloc2Links
Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap
☆22Updated 8 years ago
Alternatives and similar repositories for painless_intro_ptmalloc2
Users that are interested in painless_intro_ptmalloc2 are comparing it to the libraries listed below
Sorting:
- A pin tool to visualise heap operations☆21Updated 10 years ago
- ☆49Updated 7 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆51Updated 7 years ago
- Routines for hunting down kernel structs.☆41Updated 14 years ago
- Fuzzing scripts for the American Fuzzy Lop (AFL) fuzzer☆48Updated 9 years ago
- Python repository containing parsed standard C library function and argument information☆27Updated 6 years ago
- ARM rop chain gadget searcher☆38Updated 7 years ago
- Graphical ROP chain builder using radare2 and r2pipe☆51Updated 7 years ago
- Attacking the Core associated source files☆88Updated 7 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 8 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆69Updated 11 years ago
- ☆45Updated 7 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆21Updated 5 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆50Updated 7 years ago
- A pip wrapper around our ridiculous amount of qemu forks.☆50Updated last year
- Bootloader research tools (very much a work in progress)☆37Updated 6 years ago
- covFuzz☆34Updated 8 years ago
- A Python tool to generate ROP chains☆64Updated 8 months ago
- Use angr inside the radare2 debugger. Create an angr state from the current debugger state.☆34Updated 6 years ago
- PoC code for our presentation titled "Stackjacking Your Way to grsec/PaX Bypass"☆46Updated 14 years ago
- A distributed corpus distillation tool for windows applications.☆32Updated 8 years ago
- Memory fuzzing based on sinn3r's In Memory Fuzzer☆25Updated 13 years ago
- Some stuffs for CODE BLUE 2016☆23Updated 8 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- various CTF writeups☆60Updated 7 years ago
- 3D Accelerated Exploitation☆53Updated 6 years ago
- Old mitigation-bounty code that was applicable to edge before it use webkit/chrome☆87Updated 8 years ago
- ProXBBE (Protocol eXtraction By Binary Execution)☆31Updated 8 years ago
- Symbolic Execution Tool in r2☆106Updated 3 years ago
- A ROP and binary analysis exploit challenge for edurange☆15Updated 10 years ago