Heap Exploitation Resources
☆23Jun 5, 2023Updated 2 years ago
Alternatives and similar repositories for Heap-Resources
Users that are interested in Heap-Resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Protocol Reverse Engineering Resources☆23May 10, 2023Updated 2 years ago
- Script for emulating Arm firmware in QEMU, including a binary for hooking functions for certain Tenda firmware versions that are not stra…☆31Mar 23, 2020Updated 6 years ago
- ROM dump of the MYK82 chip in a Fortezza Card. Successor to the Clipper Chip.☆14Jul 28, 2024Updated last year
- ☆44Jun 22, 2021Updated 4 years ago
- libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆25May 23, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- iTLB multihit PoC☆44Nov 4, 2023Updated 2 years ago
- Implementation of CoAP Server & Client in Go by @Kistler-Group☆13Jun 22, 2021Updated 4 years ago
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆13Jan 19, 2024Updated 2 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 3 years ago
- Linux Kernel Fuzzer Corpus☆157Updated this week
- A tool to decrypt all Synology encrypted archives (SPK, PAT, ...)☆20Jun 6, 2025Updated 10 months ago
- how to get a few pwn points if you don't know how to pwn☆30Jul 6, 2019Updated 6 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- ☆35Feb 27, 2026Updated last month
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- CVE-2024-53691☆15Jan 13, 2025Updated last year
- ncurses shellcode/instructions tester using unicorn-engine☆13Feb 1, 2025Updated last year
- A research paper about the internals of memory management and heap exploitation☆27Dec 1, 2022Updated 3 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆15Aug 16, 2019Updated 6 years ago
- Reference DHCP client in go☆10Jul 1, 2024Updated last year
- Hello World examples in assembly, for use as templates.☆12Jan 18, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆11Jan 25, 2022Updated 4 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- MODBUS Penetration Testing Framework☆12Jul 2, 2017Updated 8 years ago
- This is a ctf challenge for qemu escape, it's basic and normal, but there is a thinking trap in it, you may need some time to find out th…☆10Mar 28, 2024Updated 2 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆20Apr 6, 2026Updated last week
- ☆16Jun 23, 2024Updated last year
- Command-line tool that provides a workflow for extending, editing, diffing, and writing to vim-style grep lines.☆11Jun 21, 2024Updated last year
- test☆19Nov 9, 2021Updated 4 years ago
- Various Go utilities used by mautrix-go and bridges☆16Apr 6, 2026Updated last week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- CTF challenges that I created☆19Dec 26, 2021Updated 4 years ago
- degoogle for your browser☆18Sep 9, 2021Updated 4 years ago
- My public CTF challenge☆17Aug 25, 2025Updated 7 months ago
- Convex optimization for fun and profit.☆11Jan 12, 2022Updated 4 years ago
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 5 months ago
- ☆19May 1, 2025Updated 11 months ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago