yannayl / glibc_malloc_for_exploitersLinks
GlibC Malloc for Exploiters presentation
☆147Updated 5 years ago
Alternatives and similar repositories for glibc_malloc_for_exploiters
Users that are interested in glibc_malloc_for_exploiters are comparing it to the libraries listed below
Sorting:
- Some new commands debug heap for peda☆99Updated last month
- Use angr inside GDB. Create an angr state from the current debugger state.☆199Updated 4 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Updated 5 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 5 years ago
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 2 years ago
- SymGDB - symbolic execution plugin for gdb☆216Updated 7 years ago
- An interactive memory info for pwning / exploiting☆102Updated 2 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆216Updated 8 months ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆223Updated 4 years ago
- Heap exploitation technique bypassing heap ASLR☆47Updated 5 years ago
- My CTF writeup☆26Updated 8 years ago
- ☆90Updated 6 years ago
- WCTF 2019 challenge☆100Updated 5 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆92Updated 9 years ago
- TokyoWestens CTF 4th 2018 EscapeMe challenge☆89Updated 6 years ago
- Some of my CTF solutions☆80Updated 6 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆90Updated 6 years ago
- Some CTF write up☆246Updated 3 years ago
- ☆51Updated 7 years ago
- A python library to find one-gadget☆29Updated 6 years ago
- Code and exercises for a workshop on z3 and angr☆228Updated 4 years ago
- various CTF writeups☆60Updated 6 years ago
- PEDA-like debugger UI for WinDbg☆204Updated last year
- ☆87Updated 8 years ago
- ☆53Updated 3 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago
- ☆154Updated 6 years ago
- ☆82Updated 7 years ago
- This tool can be useful for solving some reversing challenges in CTFs events.☆141Updated 5 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆101Updated 5 years ago