Linux Binary Exploitation
-
Updated
Jun 15, 2021 - C
Linux Binary Exploitation
ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives
HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators
A research paper about the internals of memory management and heap exploitation
Writeups of some of the Binary Exploitation challenges that I have solved during CTF.
Some exercises from my System and Network Hacking course @ University of Pisa
Add a description, image, and links to the heap-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the heap-exploitation topic, visit your repo's landing page and select "manage topics."