heap-exploitation
Here are 16 public repositories matching this topic...
My solutions to some CTF challenges and a list of interesting resources about pwning stuff
-
Updated
Jul 25, 2019 - Python
A description of the "House of Corrosion" GLIBC heap exploitation technique.
-
Updated
Sep 16, 2020
independant research on the glibc heap implementation
-
Updated
Oct 20, 2020 - Python
Some exercises from my System and Network Hacking course @ University of Pisa
-
Updated
Jan 10, 2021 - C
ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives
-
Updated
Mar 3, 2021 - C
A happy heap editor to support your exploitation process 🙂
-
Updated
May 6, 2021 - JavaScript
Udemy – Linux Heap Exploitation
-
Updated
Jun 14, 2021 - Python
Linux Binary Exploitation
-
Updated
Jun 15, 2021 - C
HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators
-
Updated
Jan 14, 2022 - C
A research paper about the internals of memory management and heap exploitation
-
Updated
Dec 1, 2022 - C
A tool combining DWARF info and source to search for kernel heap objects
-
Updated
Mar 8, 2024 - Rust
Hack software by intercepting and manipulating memory on Linux.
-
Updated
Jul 9, 2024 - C++
Writeups of some of the Binary Exploitation challenges that I have solved during CTF.
-
Updated
Jul 23, 2024 - C
All CTFs solved in Offensive and Defensive Cyber Security course of Polytechnic of Milan 23/24 edition
-
Updated
Oct 13, 2024 - Python
Some tools I always carry with me in my toolbox
-
Updated
Oct 13, 2024 - Shell
Improve this page
Add a description, image, and links to the heap-exploitation topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the heap-exploitation topic, visit your repo's landing page and select "manage topics."