Linux Binary Exploitation
-
Updated
Jun 15, 2021 - C
Linux Binary Exploitation
A description of the "House of Corrosion" GLIBC heap exploitation technique.
A happy heap editor to support your exploitation process 🙂
ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives
My solutions to some CTF challenges and a list of interesting resources about pwning stuff
Udemy – Linux Heap Exploitation
HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators
A research paper about the internals of memory management and heap exploitation
A tool combining DWARF info and source to search for kernel heap objects
Writeups of some of the Binary Exploitation challenges that I have solved during CTF.
Some exercises from my System and Network Hacking course @ University of Pisa
Hack software by intercepting and manipulating memory on Linux.
All CTFs solved in Offensive and Defensive Cyber Security course of Polytechnic of Milan 23/24 edition
independant research on the glibc heap implementation
A simple Heap-based Buffer Overflow(with RCE)-vulnerable application and POC for Windows.
Some tools I always carry with me in my toolbox
Add a description, image, and links to the heap-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the heap-exploitation topic, visit your repo's landing page and select "manage topics."