Heap Exploitation Resources
☆23Jun 5, 2023Updated 2 years ago
Alternatives and similar repositories for Heap-Resources
Users that are interested in Heap-Resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Protocol Reverse Engineering Resources☆23May 10, 2023Updated 2 years ago
- A collection of boilerplate code and projects for testing ideas☆14Jan 14, 2026Updated 3 months ago
- ☆44Jun 22, 2021Updated 4 years ago
- Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)☆11Jan 22, 2025Updated last year
- PAM module. If bad guys will force you to unlock, you can use this module to run some command before unlock using "secret" credits.☆13May 10, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- OpenRISC 1000 processor module for IDA 7.x☆13Feb 13, 2024Updated 2 years ago
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆13Jan 19, 2024Updated 2 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 3 years ago
- Base64 Mutator☆13Feb 13, 2021Updated 5 years ago
- A tool to decrypt all Synology encrypted archives (SPK, PAT, ...)☆20Jun 6, 2025Updated 11 months ago
- ☆12Nov 12, 2022Updated 3 years ago
- how to get a few pwn points if you don't know how to pwn☆30Jul 6, 2019Updated 6 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 5 years ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- CVE-2024-53691☆15Jan 13, 2025Updated last year
- A research paper about the internals of memory management and heap exploitation☆27Dec 1, 2022Updated 3 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- Reference DHCP client in go☆10Jul 1, 2024Updated last year
- Hello World examples in assembly, for use as templates.☆12Jan 18, 2026Updated 3 months ago
- Wi-Fi and Bluetooth Firmware from macOS Big Sur for T2 and M1 Macs☆14Oct 23, 2023Updated 2 years ago
- ☆16May 15, 2021Updated 4 years ago
- ☆11Jan 25, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- engine for web-based bullet dodging game☆12May 13, 2017Updated 8 years ago
- All PWN-oriented (X-DEV/RE) CTFs from http://CTFTIME.org (organized in an excel sheet) 2016-2022 CTFs☆10Nov 21, 2022Updated 3 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- This is a ctf challenge for qemu escape, it's basic and normal, but there is a thinking trap in it, you may need some time to find out th…☆10Mar 28, 2024Updated 2 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆20Apr 22, 2026Updated 2 weeks ago
- llolbas is a repo containing a localized and off-line version of the ever popular Living Off the Land Binaries and Scripts (LOLBAS) proje…☆12May 1, 2023Updated 3 years ago
- Various Go utilities used by mautrix-go and bridges☆16May 1, 2026Updated last week
- CTF challenges that I created☆19Dec 26, 2021Updated 4 years ago
- ☆10Apr 13, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Monster Hunter 3 (~tri) Server Project patcher☆19Dec 21, 2022Updated 3 years ago
- Convex optimization for fun and profit.☆11Jan 12, 2022Updated 4 years ago
- My public CTF challenge☆17Aug 25, 2025Updated 8 months ago
- A Linux Kernel Exploitation C Library☆20Oct 29, 2025Updated 6 months ago
- ☆19May 1, 2025Updated last year
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- IECS213 微處理機系統☆12Dec 12, 2025Updated 4 months ago