How to exploit a double free vulnerability in 2021. Use After Free for Dummies
-
Updated
Oct 31, 2021 - Python
How to exploit a double free vulnerability in 2021. Use After Free for Dummies
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
Writeups of some of the Binary Exploitation challenges that I have solved during CTF.
Light-weight (as light as hydrogen) unit test framework for C/C++, since 2012
A Structured Discipline Of Programming
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
Add a description, image, and links to the double-free topic page so that developers can more easily learn about it.
To associate your repository with the double-free topic, visit your repo's landing page and select "manage topics."