RCE through Leakless HeapFengShui, fastbin alloc anywhere.
☆82Dec 11, 2018Updated 7 years ago
Alternatives and similar repositories for House-Of-Roman
Users that are interested in House-Of-Roman are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- some challenge of hctf2017☆11Nov 14, 2017Updated 8 years ago
- Source code and exploits for some 35c3ctf challenges.☆143Dec 30, 2018Updated 7 years ago
- Heap exploitation technique bypassing heap ASLR☆49Sep 2, 2019Updated 6 years ago
- TokyoWestens CTF 4th 2018 EscapeMe challenge☆89Sep 5, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Jul 20, 2019Updated 6 years ago
- VirtualBox 3D exploits & PoCs☆163Jan 24, 2019Updated 7 years ago
- Some CTF write up☆256Aug 29, 2025Updated 6 months ago
- A collection for some scripts I used in CTF.☆15Apr 4, 2018Updated 7 years ago
- writeup of some ctf challs☆11Apr 20, 2025Updated 11 months ago
- All ctf challs and scripts (and writeup, maybe) from 0ops.☆151Apr 13, 2023Updated 2 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Return-oriented Programming toolkit☆353May 14, 2017Updated 8 years ago
- ☆19May 23, 2019Updated 6 years ago
- ☆55Jul 13, 2015Updated 10 years ago
- Some tools for CTF off line☆19Nov 19, 2017Updated 8 years ago
- For Linux binary Exploitation☆847Mar 26, 2018Updated 8 years ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆769Jul 25, 2022Updated 3 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆228Jul 2, 2025Updated 8 months ago
- My slides☆89Nov 4, 2019Updated 6 years ago
- V8 Tutorial PLDI 2019☆78Jul 23, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Feb 27, 2018Updated 8 years ago
- ☆68Apr 27, 2020Updated 5 years ago
- Official repository containing files related to N1CTF 2018.☆223Apr 26, 2018Updated 7 years ago
- dc2020 quals kernel pwn☆12May 18, 2020Updated 5 years ago
- SECCON 2018 Online CTF 27-28 Oct. 2018☆37Nov 4, 2018Updated 7 years ago
- ☆227Dec 9, 2020Updated 5 years ago
- PEDA-like debugger UI for WinDbg☆206Mar 29, 2024Updated last year
- Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018☆180Feb 7, 2024Updated 2 years ago
- Linux Heap Exploitation Practice☆395Dec 1, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆287Apr 23, 2020Updated 5 years ago
- realworld ctf live stream☆74Feb 4, 2024Updated 2 years ago
- ☆38Nov 30, 2020Updated 5 years ago
- Build docker container for @MaskRay's pcap-search☆12Oct 19, 2018Updated 7 years ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆521Jun 28, 2024Updated last year
- Use angr in the IDA Pro debugger generating a state from the current debug session☆283Jul 22, 2020Updated 5 years ago
- python library to examine ptmalloc (the glibc userland heap implementation)☆508May 11, 2021Updated 4 years ago