one2blame / heaplab
Notes and challenges from the HeapLAB course taught by Max Kamper.
☆19Updated 3 years ago
Alternatives and similar repositories for heaplab:
Users that are interested in heaplab are comparing it to the libraries listed below
- Linux & Android Kernel Vulnerability research and exploitation☆32Updated last year
- Collection of browser challenges☆120Updated 3 years ago
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆58Updated 6 months ago
- a new class of file structure attacks☆46Updated 2 years ago
- Targeting Windows Kernel Driver Fuzzer☆152Updated 2 months ago
- CTF pwn problem writeup☆38Updated last year
- A tool for automating setup of kernel pwn challenges☆52Updated 2 months ago
- ☆161Updated this week
- Linux kernel privilege escalation techniques☆123Updated 5 months ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆70Updated last month
- Writeups for CTFs☆69Updated 3 weeks ago
- Use-After-Free in Netfilter nf_tables when processing batch requests CVE-2023-32233☆51Updated last year
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆40Updated 2 years ago
- Exploit for Real World CTF 6th RIPTC.☆33Updated 11 months ago
- Blogpost about optimizing binary-only fuzzing with AFL++☆63Updated last year
- ☆71Updated last year
- Simple script to find kernel objects of a certain size in the Linux kernel☆107Updated 2 years ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆208Updated 3 weeks ago
- A collection of my weggli patterns to facilitate vulnerability research.☆94Updated last year
- Old and new CTFs about Linux kernel exploitation.☆52Updated 2 years ago
- ASLR bypass without infoleak☆159Updated 3 years ago
- "Pwntools does not support Windows. Use a real OS ;)" — Zach Riggle, 2015☆82Updated 5 years ago
- Udemy – Linux Heap Exploitation☆35Updated 3 years ago
- various docs (that are interesting, or not, depending on the point of view...)☆99Updated last year
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆182Updated 10 months ago
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆240Updated last month
- ☆147Updated 11 months ago
- Analyze Golang with Ghidra☆133Updated 2 weeks ago
- ☆168Updated 10 months ago
- Chrome V8 CVE exploits and proof-of-concept scripts written by me, for educational and research purposes only.☆40Updated 4 months ago