HyggeHalcyon
Github
LinkedIn
More
Github
LinkedIn
Search...
Ctrl + K
Resources
Cyber Security
Binary Exploitation
Heap Exploitation
Previous
File Structure Oriented Programming
Next
Linux Kernel Exploitation
Last updated
11 months ago
Introduction
How Malloc works
PoC of Techniques
House of Writeups
House of TO-DO
TO-DO
📚
Preface
heap-exploitation
Heap Exploitation Part 1: Understanding the Glibc Heap Implementation
Azeria-Labs