Linux Binary Exploitation
翻译 - Linux 二进制开发
A description of the "House of Corrosion" GLIBC heap exploitation technique.
翻译 - GLIBC“腐蚀之屋”堆开采技术的描述。
A happy heap editor to support your exploitation process 🙂
ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives
My solutions to some CTF challenges and a list of interesting resources about pwning stuff
HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators
A research paper about the internals of memory management and heap exploitation
A tool combining DWARF info and source to search for kernel heap objects
Writeups of some of the Binary Exploitation challenges that I have solved during CTF.
Some exercises from my System and Network Hacking course @ University of Pisa
Bellek taşmalarını öğrenin (🇹🇷 Türkçe bir kaynak)
Hack software by intercepting and manipulating memory on Linux.
All CTFs solved in Offensive and Defensive Cyber Security course of Polytechnic of Milan 23/24 edition
independant research on the glibc heap implementation
A simple Heap-based Buffer Overflow(with RCE)-vulnerable application and POC for Windows.
Some tools I always carry with me in my toolbox