str8outtaheap / heapwn
Linux Heap Exploitation Practice
☆377Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for heapwn
- Collection of scripts and writeups☆320Updated 2 years ago
- Some CTF write up☆240Updated 2 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆220Updated 4 years ago
- Using Intel's PIN tool to solve CTF problems☆493Updated 4 years ago
- 🔍Heap analysis tool for CTF pwn.☆221Updated 3 years ago
- Simplify format string exploitation.☆339Updated 3 years ago
- repository for kernel exploit practice☆388Updated 5 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆199Updated 4 years ago
- Detect, analyze and uniquely identify crashes in Windows applications☆501Updated 4 months ago
- Some new commands debug heap for peda☆98Updated 4 years ago
- This tool can be useful for solving some reversing challenges in CTFs events.☆138Updated 4 years ago
- Manul is a coverage-guided parallel fuzzer for open-source and blackbox binaries on Windows, Linux and MacOS☆337Updated 4 years ago
- ☆280Updated 4 years ago
- How to build an efficient pwn development environment in 2020☆258Updated 3 years ago
- My Chrome and Safari exploit code + write-up repo☆528Updated 3 years ago
- Useful tips by OTA CTF members☆135Updated 5 years ago
- IDA Pro plugin to examine the glibc heap, focused on exploit development☆739Updated 2 years ago
- 💖CTF pwn framework.☆341Updated 2 years ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆382Updated last year
- Fuzzer for Linux Kernel Drivers