xf1les / muslheap
a GDB plug-in for inspecting mallocng
☆57Updated 9 months ago
Alternatives and similar repositories for muslheap
Users that are interested in muslheap are comparing it to the libraries listed below
Sorting:
- Linux kernel privilege escalation techniques☆135Updated 9 months ago
- A simple shell script and two bash sourceable scripts used to build a static gdb-7.12 gdbserver using cross-compiler setups☆87Updated 7 years ago
- ☆24Updated 3 years ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆77Updated 5 months ago
- a new class of file structure attacks☆50Updated 2 years ago
- ☆110Updated last year
- ☆52Updated 3 years ago
- gdb plugin for linux kernel to debug slub☆52Updated 5 years ago
- ☆39Updated 2 years ago
- ☆46Updated 2 years ago
- ☆19Updated 6 months ago
- SAEG: Stateful Automatic Exploit Generation, an AEG framework for CGC / RHG and pwnable CTF challenges.☆125Updated 4 months ago
- Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices,…☆17Updated 7 years ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆222Updated 4 months ago
- A plugin to resolve .plt.sec symbols in IDA☆77Updated 4 years ago
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆11Updated 3 years ago
- ☆11Updated 8 months ago
- SCTF 2023 kernel pwn && CVE-2023-3640☆26Updated last year
- The best vulnerable driver to learn how to exploit kernel vulnerability.☆29Updated 5 years ago
- sakura stl learn☆21Updated 4 years ago
- Something about CTF and vulnerability environment, mainly about kernel exploit.☆46Updated 2 years ago
- ☆18Updated last year
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆80Updated 3 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆93Updated 3 years ago
- ☆43Updated 3 years ago
- Debug pwn in docker, no need for virtual machines☆36Updated 3 years ago
- Templates for deploying pwn challenge in ctf☆37Updated 2 years ago
- convert luac to lua source☆9Updated 4 months ago
- a simple method to get v8 source code with github action☆75Updated last year
- Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn☆184Updated 4 years ago