romanking98 / House-Of-RomanView external linksLinks
RCE through Leakless HeapFengShui, fastbin alloc anywhere.
☆82Dec 11, 2018Updated 7 years ago
Alternatives and similar repositories for House-Of-Roman
Users that are interested in House-Of-Roman are comparing it to the libraries listed below
Sorting:
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- Source code and exploits for some 35c3ctf challenges.☆143Dec 30, 2018Updated 7 years ago
- Heap exploitation technique bypassing heap ASLR☆48Sep 2, 2019Updated 6 years ago
- some challenge of hctf2017☆11Nov 14, 2017Updated 8 years ago
- TokyoWestens CTF 4th 2018 EscapeMe challenge☆89Sep 5, 2018Updated 7 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Jul 20, 2019Updated 6 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- writeup of some ctf challs☆11Apr 20, 2025Updated 9 months ago
- Some CTF write up☆255Aug 29, 2025Updated 5 months ago
- VirtualBox 3D exploits & PoCs☆162Jan 24, 2019Updated 7 years ago
- ☆55Jul 13, 2015Updated 10 years ago
- ☆19May 23, 2019Updated 6 years ago
- All ctf challs and scripts (and writeup, maybe) from 0ops.☆150Apr 13, 2023Updated 2 years ago
- A collection for some scripts I used in CTF.☆15Apr 4, 2018Updated 7 years ago
- For Linux binary Exploitation☆843Mar 26, 2018Updated 7 years ago
- SECCON 2018 Online CTF 27-28 Oct. 2018☆37Nov 4, 2018Updated 7 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018☆180Feb 7, 2024Updated 2 years ago
- A Return-oriented Programming toolkit☆352May 14, 2017Updated 8 years ago
- ☆68Apr 27, 2020Updated 5 years ago
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- V8 Tutorial PLDI 2019☆78Jul 23, 2019Updated 6 years ago
- Official repository containing files related to N1CTF 2018.☆223Apr 26, 2018Updated 7 years ago
- The slides I have ever presented☆132Aug 18, 2018Updated 7 years ago
- ☆227Dec 9, 2020Updated 5 years ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆765Jul 25, 2022Updated 3 years ago
- Use angr in the IDA Pro debugger generating a state from the current debug session☆281Jul 22, 2020Updated 5 years ago
- Linux Heap Exploitation Practice☆395Dec 1, 2018Updated 7 years ago
- PEDA-like debugger UI for WinDbg☆206Mar 29, 2024Updated last year
- ☆286Apr 23, 2020Updated 5 years ago
- Build docker container for @MaskRay's pcap-search☆12Oct 19, 2018Updated 7 years ago
- dc2020 quals kernel pwn☆12May 18, 2020Updated 5 years ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆523Jun 28, 2024Updated last year
- Solutions for my 34C3CTF challenges☆21Jul 9, 2018Updated 7 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆224Jul 2, 2025Updated 7 months ago
- realworld ctf live stream☆74Feb 4, 2024Updated 2 years ago
- CTF Write-ups☆29Apr 20, 2021Updated 4 years ago
- Fuzzy search tool for IDA Pro.☆207Dec 16, 2019Updated 6 years ago
- My slides☆89Nov 4, 2019Updated 6 years ago