shinmao / WhyNot-HEAP-ExploitationLinks
Record my learn path of HEAP EXPLOITATION on LINUX
β14Updated 7 years ago
Alternatives and similar repositories for WhyNot-HEAP-Exploitation
Users that are interested in WhyNot-HEAP-Exploitation are comparing it to the libraries listed below
Sorting:
- πDynamic memory watcher/tracer/analyzer for CTF pwnβ51Updated 5 years ago
- CFG and scripts for fuzzing the PHP interpreter with Domatoβ28Updated 5 years ago
- β66Updated 3 years ago
- Exploit for the [pwn] just-in-time challenge from google ctf 2018's finals (TurboFan bug)β61Updated 6 years ago
- Fuzzing library written in/for python.β85Updated 5 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learningβ63Updated 4 years ago
- β22Updated 6 years ago
- TokyoWestens CTF 4th 2018 EscapeMe challengeβ89Updated 7 years ago
- Repository of the findings found by wtf when fuzzing IDA75.β86Updated 4 years ago
- All virtualization escape challenges and writeups in RealWorldCTFβ89Updated 6 years ago
- β32Updated 4 years ago
- β68Updated last year
- An example on how to do performant in-memory fuzzing with AFL++ and Fridaβ138Updated 6 years ago
- Fuzzilli For quickjsβ28Updated 6 years ago
- Shared Library to intercept nvram get/set/match calls for emulating libnvram.so used by many IoT firmware software.β68Updated 4 years ago
- My Material for the HITB presentationβ35Updated 5 years ago
- A toy Fuzzer for wasm fuzzing based on fuzzilliβ72Updated 3 years ago
- A DOM fuzzerβ155Updated 3 years ago
- A new type of js fuzzerβ26Updated 5 years ago
- attachments for forum of RealWorld CTF 3rdβ42Updated 4 years ago
- My public CTF challengeβ17Updated 4 months ago
- qemu vulnerablity.β54Updated 4 years ago
- A collection of 1days and solutions to challenges related to v8/chrome I developedβ160Updated 6 years ago
- β36Updated 7 years ago
- This is the full file system fuzzing framework that I presented at the Hack in the Box 2020 Lockdown Edition conference in April.β149Updated 2 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagationβ48Updated 8 years ago
- Fuzzing JavaScript WebAssembly APIs using Dharma/Domato (Chrome/v8, etc.)β43Updated 3 years ago
- Analyze IoT firmwareβ17Updated 4 years ago
- This is the project of LearnAFL.β28Updated 5 years ago
- r3kapig websiteβ34Updated last month