CVE-2018-8174 - VBScript memory corruption exploit.
Repository to train/learn memory corruption on the ARM platform.
Advanced buffer overflow and memory corruption security challenges
chap analyzes un-instrumented core files for leaks, memory growth, and corruption
Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)
A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber
A shared (dynamic) library that can be transparently injected into different processes to detect memory corruption in glibc heap
How to write basic memory corruption exploits on Windows
Traditional Mitigation in GCC to defend Memory Corruption Vulnerability
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
Paracosme is a zero-click remote memory corruption exploit that compromises ICONICS Genesis64 which was demonstrated successfully on stage during the Pwn2Own Miami 2022 competition.
Corruption and Perturbation Robustness (ICLR 2019)
Hardcore corruption of my execve() vulnerability in WSL
Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.
翻译 - Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.
STL compatible C++ memory allocator library using a new RawAllocator concept that is similar to an Allocator but easier to use and write.
📜 Memory stack is a developer oriented journaling social platform.
FlatBuffers 是一个注重内存效率的序列化库
Coc source from fenoxo
A theme for wordpress.
A memory leak detection library for Android.
翻译 - LeakCanary是适用于Android的内存泄漏检测库。
Memory Networks implementations