str8outtaheap / pwning
☆106Updated this week
Related projects: ⓘ
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆51Updated 6 years ago
- GlibC Malloc for Exploiters presentation☆146Updated 5 years ago
- Unravels any libcs magic for your ret2libc exploit.☆80Updated last year
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 6 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆130Updated 5 years ago
- Some kernel exploits☆142Updated 6 years ago
- Symbolic Execution Tool in r2☆104Updated 2 years ago
- Small tool for generating ropchains using unicorn and z3☆197Updated 6 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆87Updated 8 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆243Updated 4 years ago
- ☆82Updated 7 years ago
- Solutions for my 34C3CTF challenges☆20Updated 6 years ago
- Attacking the Core associated source files☆86Updated 6 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆159Updated 6 years ago
- WinHeap Explorer repository.☆119Updated 6 years ago
- ☆88Updated 5 years ago
- ☆91Updated 3 years ago
- Cream of the Crop Pwning Challenges☆31Updated 4 years ago
- ☆84Updated 8 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆38Updated 7 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆115Updated 4 years ago
- ☆100Updated 6 years ago
- PEDA-like debugger UI for WinDbg☆198Updated 5 months ago
- This tool can be useful for solving some reversing challenges in CTFs events.☆135Updated 4 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆86Updated 5 years ago
- Heap exploitation technique bypassing heap ASLR☆47Updated 5 years ago
- A collection of more than 1000 binary libc files☆86Updated 9 years ago
- Content from presentation at BHUSA 2017☆179Updated 7 years ago
- A project that uses Binary Ninja and GRAKN.AI to perform static analysis on binary files with the goal of identifying bugs in software.☆57Updated 5 years ago
- ☆121Updated 6 years ago