My solutions to some CTF challenges and a list of interesting resources about pwning stuff
-
Updated
Jul 25, 2019 - Python
My solutions to some CTF challenges and a list of interesting resources about pwning stuff
Udemy – Linux Heap Exploitation
Writeups of some of the Binary Exploitation challenges that I have solved during CTF.
All CTFs solved in Offensive and Defensive Cyber Security course of Polytechnic of Milan 23/24 edition
independant research on the glibc heap implementation
Add a description, image, and links to the heap-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the heap-exploitation topic, visit your repo's landing page and select "manage topics."