some demos demonstrate the heap exploitation of ptmalloc2
☆12May 25, 2017Updated 8 years ago
Alternatives and similar repositories for ptmalloc2_exploit_demos
Users that are interested in ptmalloc2_exploit_demos are comparing it to the libraries listed below
Sorting:
- ☆17May 13, 2019Updated 6 years ago
- Collection of modified open fuzzer.☆30Jun 9, 2012Updated 13 years ago
- cve2014-3153 exploit for ubuntu x86☆18Jan 24, 2015Updated 11 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆94Nov 16, 2015Updated 10 years ago
- A collection of more than 1000 binary libc files☆90Mar 26, 2015Updated 10 years ago
- ☆17Aug 20, 2014Updated 11 years ago
- ☆18May 18, 2018Updated 7 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- Hack In Paris 2018 Slideware☆18Jul 2, 2018Updated 7 years ago
- Windows Kernel Dump Analyzer☆15May 9, 2015Updated 10 years ago
- bctf2017 challenges☆11Apr 20, 2017Updated 8 years ago
- ☆74Jan 25, 2018Updated 8 years ago
- CVE-2015-3636 exploit☆45Nov 22, 2015Updated 10 years ago
- exploit code for a bpf heap overflow vulnerability☆28Sep 3, 2019Updated 6 years ago
- Improvised json-based configurable Windows sandbox☆11Sep 29, 2020Updated 5 years ago
- Linux local root exploit for CVE-2014-0038☆199Apr 18, 2014Updated 11 years ago
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 10 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆46Jun 11, 2022Updated 3 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- Full functional idascript with stdin/stdout handled☆20Jan 25, 2017Updated 9 years ago
- dc2020 quals kernel pwn☆12May 18, 2020Updated 5 years ago
- A collection for some scripts I used in CTF.☆15Apr 4, 2018Updated 7 years ago
- Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference☆52Apr 7, 2016Updated 9 years ago
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- Dive into ELF files using simple self-contained examples☆153Aug 30, 2015Updated 10 years ago
- Short, unrelated helper scripts for users of AFL (the fuzzer)☆112Aug 21, 2016Updated 9 years ago
- GATEKEEPER: Inline and on-target defense☆123Sep 1, 2022Updated 3 years ago
- IDA script for parsing kallsyms☆86Dec 8, 2025Updated 3 months ago
- ☆81Jun 12, 2017Updated 8 years ago
- P3DA - Python3 Exploit Development Assistance for GDB☆40Jul 12, 2015Updated 10 years ago
- slide and full exploit☆87Oct 1, 2020Updated 5 years ago
- simple rootkit for computer security class☆15Dec 18, 2012Updated 13 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆38Nov 16, 2015Updated 10 years ago
- An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.☆14Sep 12, 2019Updated 6 years ago
- ☆16Jun 25, 2018Updated 7 years ago
- A C/C++ code obfuscator based on llvm/clang technology☆16Sep 19, 2014Updated 11 years ago
- some challenge of hctf2017☆11Nov 14, 2017Updated 8 years ago
- realworld ctf live stream☆74Feb 4, 2024Updated 2 years ago
- A crappy tool used in our private PS4 jailbreak☆99Oct 27, 2016Updated 9 years ago