How to exploit a double free vulnerability in 2021. Use After Free for Dummies
☆1,383Jan 31, 2025Updated last year
Alternatives and similar repositories for how-to-exploit-a-double-free
Users that are interested in how-to-exploit-a-double-free are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- kernel-pwn and writeup collection☆710Oct 2, 2023Updated 2 years ago
- A repository for learning various heap exploitation techniques.☆8,584Mar 26, 2026Updated 2 weeks ago
- Kernel development & exploitation practice environment.☆251Sep 10, 2023Updated 2 years ago
- An step by step fuzzing tutorial. A GitHub Security Lab initiative☆3,751Jun 3, 2024Updated last year
- ☆190Feb 8, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- repository for kernel exploit practice☆417Nov 12, 2019Updated 6 years ago
- A blazing fast™ multithreaded ROP Gadget finder. ropper / ropgadget alternative (currently x86 only)☆547Jun 4, 2025Updated 10 months ago
- A collection of links related to Linux kernel security and exploitation☆6,399Mar 7, 2026Updated last month
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,745Jan 2, 2026Updated 3 months ago
- ☆298Jun 21, 2022Updated 3 years ago
- Perfect Blue's CTF Writeups☆695Jun 24, 2024Updated last year
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆861Jun 4, 2020Updated 5 years ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,286Jan 29, 2026Updated 2 months ago
- Some pwn challenges selected for training and education.☆388Jun 26, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- awesome list of browser exploitation tutorials☆2,275Sep 18, 2023Updated 2 years ago
- A reversing plugin for cross-decompiler collaboration, built on git.☆695Apr 2, 2026Updated last week
- Here is some resources about macOS/iOS system security.☆550Feb 19, 2025Updated last year
- The best tool for finding one gadget RCE in libc.so.6☆2,315Mar 5, 2026Updated last month
- A collection of links related to VMware escape exploits☆1,494Sep 4, 2024Updated last year
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆2,486Jul 12, 2024Updated last year
- pwninit - automate starting binary exploit challenges☆1,093Dec 7, 2025Updated 4 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆4,412Updated this week
- A list of helpful cybersecurity / infosec resources☆1,353Nov 19, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆146Aug 17, 2022Updated 3 years ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆2,109Feb 28, 2025Updated last year
- Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read☆1,355Feb 21, 2025Updated last year
- Android Kernel Exploitation☆643Feb 13, 2022Updated 4 years ago
- rp-bf: A library to bruteforce ROP gadgets by emulating a Windows user-mode crash-dump☆121May 1, 2024Updated last year
- A collection of proof-of-concept exploit scripts written by the STAR Labs team for various CVEs that they discovered or found by others.☆311Jul 16, 2025Updated 8 months ago
- Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)☆965Mar 14, 2022Updated 4 years ago
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆764Jan 27, 2026Updated 2 months ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,986Feb 24, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A JavaScript Engine Fuzzer☆2,175Updated this week
- A True Instrumentable Binary Emulation Framework☆5,875Updated this week
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆244Dec 23, 2024Updated last year
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆923May 20, 2024Updated last year
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆854Apr 16, 2025Updated 11 months ago
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆721Oct 19, 2024Updated last year
- An updated collection of resources targeting browser-exploitation.☆833Mar 8, 2021Updated 5 years ago