xf1les / muslheapLinks
a GDB plug-in for inspecting mallocng
☆59Updated last year
Alternatives and similar repositories for muslheap
Users that are interested in muslheap are comparing it to the libraries listed below
Sorting:
- ☆24Updated 3 years ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆91Updated last week
- A simple shell script and two bash sourceable scripts used to build a static gdb-7.12 gdbserver using cross-compiler setups☆87Updated 8 years ago
- Linux kernel privilege escalation techniques☆142Updated last year
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆229Updated 8 months ago
- a new class of file structure attacks☆54Updated 2 years ago
- ☆118Updated last year
- ☆19Updated 2 years ago
- gdb plugin for linux kernel to debug slub☆52Updated 5 years ago
- uacatcher open source repo☆22Updated 2 years ago
- A plugin to resolve .plt.sec symbols in IDA☆77Updated 4 years ago
- basic amd64 alphanumeric shellcode encoder☆194Updated last year
- ☆12Updated last year
- a simple method to get v8 source code with github action☆78Updated 2 years ago
- ☆52Updated 3 years ago
- Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices,…☆17Updated 8 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆89Updated 3 years ago
- ☆12Updated 3 years ago
- ☆19Updated 10 months ago
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆11Updated 3 years ago
- A Linux Kernel Exploitation C Library☆16Updated 2 months ago
- SCTF 2023 kernel pwn && CVE-2023-3640☆29Updated 2 years ago
- Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn☆187Updated 4 years ago
- Source code for the DEF CON 32 CTF Qualifiers.☆73Updated last year
- ☆225Updated 4 years ago
- ☆40Updated last month
- Prebuilt statically linked gdbserver and gawk executables for Linux on ARMEL, MIPS/MIPSEL and more platforms for use on embedded devices,…☆52Updated 8 years ago
- ☆52Updated 3 years ago
- angr's exploration technique to perform taint analysis☆65Updated 5 years ago
- Automatic Exploit Generation Paper☆88Updated 3 years ago