use-after-free
There are 15 repositories under use-after-free topic.
stong/how-to-exploit-a-double-free
How to exploit a double free vulnerability in 2021. Use After Free for Dummies
hacksysteam/CVE-2023-21608
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
hacksysteam/CVE-2022-28672
Foxit PDF Reader Remote Code Execution Exploit
SoftwareSecurityLab/UbSym
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
vital-information-resource-under-siege/PWN-Challenges
Writeups of some of the Binary Exploitation challenges that I have solved during CTF.
GB102/VirtualEXploiter
VFGadget locator to facilitate Counterfeit Object-Oriented Programming (COOP) and Loop-Oriented Programming (LOP) attacks to bypass advanced security protections like Intel CET and Control-Flow Guard (CFG) to achieve Remote Code Execution.
GJDuck/BlueFat
Fully Randomized Pointers
ntfargo/uaf-2023-28205
PoC CVE-2023-28205: Apple WebKit Use-After-Free Vulnerability
ax330d/mshtml-patcher
MSHTML Patcher Script
Malwareman007/CVE-2023-21608
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
lingjf/h2unit
Light-weight (as light as hydrogen) unit test framework for C/C++, since 2012
NVombat/Use-After-Free
CWE-416 Use-After-Free Vulnerability, Attack and Fix
TheMatt2/analyzer-tests
A set of example C programs that demonstrate common programming mistakes, and provides results on which static code analyzers can detect these mistakes.
SaraBaradaran/UbSym
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
TheLeopardsH/Software_based_side_channel_attacks
Software based Side Channel attacks