How to exploit a double free vulnerability in 2021. Use After Free for Dummies
-
Updated
Jan 31, 2025 - Python
How to exploit a double free vulnerability in 2021. Use After Free for Dummies
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
Foxit PDF Reader Remote Code Execution Exploit
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
Writeups of some of the Binary Exploitation challenges that I have solved during CTF.
Fully Randomized Pointers
VFGadget locator to facilitate Counterfeit Object-Oriented Programming (COOP) and Loop-Oriented Programming (LOP) attacks to bypass advanced security protections like Intel CET and Control-Flow Guard (CFG) to achieve Remote Code Execution.
PoC CVE-2023-28205: Apple WebKit Use-After-Free Vulnerability
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
Light-weight (as light as hydrogen) unit test framework for C/C++, since 2012
A set of example C programs that demonstrate common programming mistakes, and provides results on which static code analyzers can detect these mistakes.
CWE-416 Use-After-Free Vulnerability, Attack and Fix
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
Software based Side Channel attacks
This repository offers practical tools and scripts to enhance your use of Adobe Acrobat. Explore features like PDF manipulation and form creation to streamline your workflow. 🛠️📄
industry-leading software for viewing, printing, and annotating PDF documents.
Add a description, image, and links to the use-after-free topic page so that developers can more easily learn about it.
To associate your repository with the use-after-free topic, visit your repo's landing page and select "manage topics."