Linux Binary Exploitation
-
Updated
Jun 15, 2021 - C
Linux Binary Exploitation
A description of the "House of Corrosion" GLIBC heap exploitation technique.
A happy heap editor to support your exploitation process 🙂
ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives
My solutions to some CTF challenges and a list of interesting resources about pwning stuff
Udemy – Linux Heap Exploitation
HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators
A research paper about the internals of memory management and heap exploitation
A tool combining DWARF info and source to search for kernel heap objects
Writeups of some of the Binary Exploitation challenges that I have solved during CTF.
Some exercises from my System and Network Hacking course @ University of Pisa
Hack software by intercepting and manipulating memory on Linux.
independant research on the glibc heap implementation
All CTFs solved in Offensive and Defensive Cyber Security course of Polytechnic of Milan 23/24 edition
Bellek taşmalarını öğrenin (🇹🇷 Türkçe bir kaynak)
A simple Heap-based Buffer Overflow(with RCE)-vulnerable application and POC for Windows.
Some tools I always carry with me in my toolbox
Add a description, image, and links to the heap-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the heap-exploitation topic, visit your repo's landing page and select "manage topics."