Focusing
low-level programming, binary exploitation, reverse engineering, red teaming
Stars
pwn
9 repositories
The danger of repetivive format string vulnerabilities and abusing exit on full RELRO
This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structure.
Wirteup of re-enabling FSOP by disabling vtable bounds checking in GLIBC 2.35
Trying to automatise creating code in pwntools for simple ROP chains
A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).
The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.
