one2blame / heaplabLinks
Notes and challenges from the HeapLAB course taught by Max Kamper.
☆21Updated 4 years ago
Alternatives and similar repositories for heaplab
Users that are interested in heaplab are comparing it to the libraries listed below
Sorting:
- Linux & Android Kernel Vulnerability research and exploitation☆60Updated 2 years ago
- a new class of file structure attacks☆58Updated 3 years ago
- Collection of browser challenges☆139Updated 4 years ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆101Updated 3 weeks ago
- angr tutorial for ctf☆163Updated 4 years ago
- A bunch of V8 resources (with a security focus)☆94Updated this week
- A tool for automating setup of kernel pwn challenges☆62Updated 3 months ago
- ☆189Updated last year
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆85Updated 7 months ago
- ☆103Updated last month
- Old and new CTFs about Linux kernel exploitation.☆64Updated 3 years ago
- ☆270Updated 6 months ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆242Updated last year
- Udemy – Linux Heap Exploitation☆54Updated 4 years ago
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆51Updated 3 years ago
- Page-Oriented Programming (POP) Tools for Black Hat USA 2023 and USENIX security 2024☆59Updated last year
- CTF pwn problem writeup☆40Updated 2 years ago
- A simple shell script and two bash sourceable scripts used to build a static gdb-7.12 gdbserver using cross-compiler setups☆90Updated 8 years ago
- Writeups for CTFs☆78Updated 5 months ago
- Linux kernel privilege escalation techniques☆152Updated last year
- prebuilt binaries for multiple architeture☆198Updated 2 years ago
- ☆111Updated last year
- various docs (that are interesting, or not, depending on the point of view...)☆134Updated 2 years ago
- Let's get familiar with Windows pwn 😎☆61Updated 5 years ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆284Updated last week
- Kernel development & exploitation practice environment.☆250Updated 2 years ago
- a GDB plug-in for inspecting mallocng☆60Updated last year
- Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn☆188Updated 5 years ago
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆69Updated 2 months ago
- A collection of curated resources and CVEs I use for research.☆107Updated 4 years ago