How to exploit a double free vulnerability in 2021. Use After Free for Dummies
-
Updated
Oct 31, 2021 - Python
How to exploit a double free vulnerability in 2021. Use After Free for Dummies
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
Foxit PDF Reader Remote Code Execution Exploit
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
Writeups of some of the Binary Exploitation challenges that I have solved during CTF.
Fully Randomized Pointers
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
Light-weight (as light as hydrogen) unit test framework for C/C++, since 2012
PoC CVE-2023-28205: Apple WebKit Use-After-Free Vulnerability
A VFGadget finder script to facilitate Counterfeit Object-Oriented Programming (COOP) and Loop-Oriented Programming (LOP) attacks to bypass advanced security protections like CET and CFG.
A set of example C programs that demonstrate common programming mistakes, and provides results on which static code analyzers can detect these mistakes.
Software based Side Channel attacks
CWE-416 Use-After-Free Vulnerability, Attack and Fix
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
Add a description, image, and links to the use-after-free topic page so that developers can more easily learn about it.
To associate your repository with the use-after-free topic, visit your repo's landing page and select "manage topics."