yannayl / glibc_malloc_for_exploitersLinks
GlibC Malloc for Exploiters presentation
☆149Updated 6 years ago
Alternatives and similar repositories for glibc_malloc_for_exploiters
Users that are interested in glibc_malloc_for_exploiters are comparing it to the libraries listed below
Sorting:
- Unravels any libcs magic for your ret2libc exploit.☆81Updated 2 years ago
- This is collaborative work of Ned Williamson and Niklas Baumstark☆132Updated 6 years ago
- Some new commands debug heap for peda☆99Updated 4 months ago
- An interactive memory info for pwning / exploiting☆102Updated 2 years ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆199Updated 5 years ago
- ☆51Updated 7 years ago
- Heap exploitation technique bypassing heap ASLR☆47Updated 5 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆249Updated 5 years ago
- SymGDB - symbolic execution plugin for gdb☆217Updated 7 years ago
- Files for the "v9" challenge of 34C3 CTF. See the greeting message in server.go for more information about the challenge☆88Updated 6 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆223Updated 4 years ago
- A plugin for Hex-Ray's IDA Pro and radare2 to export the symbols recognized to the ELF symbol table☆211Updated 3 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆216Updated last month
- ☆90Updated 6 years ago
- Files for the "feuerfuchs" challenge of 33C3 CTF. See the greeting message in server.py for more information about the challenge☆39Updated 8 years ago
- ☆90Updated 9 years ago
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆156Updated 7 years ago
- VirtualBox 3D exploits & PoCs☆162Updated 6 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆53Updated 7 years ago
- Function redirection via ELF tricks.☆162Updated 10 years ago
- WCTF 2019 challenge☆100Updated 6 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆94Updated 9 years ago
- Some kernel exploits☆144Updated 7 years ago
- PEDA-like debugger UI for WinDbg☆205Updated last year
- ☆40Updated 7 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆302Updated 2 years ago
- Solutions for my 34C3CTF challenges☆21Updated 7 years ago
- Some CTF write up☆246Updated 3 years ago
- The Harvest of V8 regress.☆137Updated 5 years ago
- A pip wrapper around AFL.☆88Updated 4 years ago