veritas501 / glibc_got_hijack_studyLinks
study https://github.com/n132/Libc-GOT-Hijacking
☆14Updated last year
Alternatives and similar repositories for glibc_got_hijack_study
Users that are interested in glibc_got_hijack_study are comparing it to the libraries listed below
Sorting:
- linux kernel cross page attack demo module☆30Updated 2 years ago
- A V8 Sandbox Escape Technique.☆16Updated 4 months ago
- ☆16Updated 2 years ago
- ☆38Updated last year
- ☆32Updated 2 years ago
- linux kernel LPE using hw_breakpoint attack tech demo☆25Updated 2 years ago
- My browser pwn collections. Mainly JavaScript engine stuff.☆27Updated 4 months ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Updated 2 years ago
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆14Updated 4 months ago
- A collection of resources and information about CVE-2023-2033☆19Updated last year
- attachment and write up for D^3CTF 2023's pwn challenge - d3kcache☆40Updated 11 months ago
- ☆32Updated 2 months ago
- CVE-2022-2586: Linux kernel nft_object UAF☆16Updated 2 years ago
- some ida script☆32Updated 3 years ago
- CVE-2022-3910☆11Updated 2 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆30Updated 3 years ago
- Merge multi binaries into one IDA database.☆24Updated 3 years ago
- ☆63Updated last year
- CVE-2022-0185 exploit rewritten with pipe primitive☆16Updated 3 years ago
- ☆26Updated last year
- PoC for House of Husk Exploit☆13Updated 5 years ago
- ☆21Updated 11 months ago
- qemu vulnerablity.☆53Updated 4 years ago
- For V8CTF M122☆12Updated 10 months ago
- ☆10Updated 3 years ago
- ☆41Updated 2 years ago
- ☆28Updated 2 years ago
- Exploit for Real World CTF 6th RIPTC.☆33Updated last year
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆17Updated last year
- IDAPython / IDC tips and tricks☆38Updated 2 years ago