use-after-free
Here are 15 public repositories matching this topic...
Language:All
Sort:Most stars
How to exploit a double free vulnerability in 2021. Use After Free for Dummies
- Updated
Jan 31, 2025 - Python
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
- Updated
Dec 5, 2023 - JavaScript
Foxit PDF Reader Remote Code Execution Exploit
- Updated
Dec 5, 2023 - JavaScript
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
- Updated
May 7, 2023 - C
Writeups of some of the Binary Exploitation challenges that I have solved during CTF.
- Updated
Feb 8, 2025 - Python
Fully Randomized Pointers
- Updated
May 22, 2024 - C
VFGadget locator to facilitate Counterfeit Object-Oriented Programming (COOP) and Loop-Oriented Programming (LOP) attacks to bypass advanced security protections like Intel CET and Control-Flow Guard (CFG) to achieve Remote Code Execution.
- Updated
Mar 16, 2025 - Python
Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
- Updated
Feb 13, 2023 - JavaScript
PoC CVE-2023-28205: Apple WebKit Use-After-Free Vulnerability
- Updated
Dec 1, 2024 - JavaScript
Light-weight (as light as hydrogen) unit test framework for C/C++, since 2012
- Updated
May 6, 2023 - C++
A set of example C programs that demonstrate common programming mistakes, and provides results on which static code analyzers can detect these mistakes.
- Updated
Feb 11, 2024 - C
CWE-416 Use-After-Free Vulnerability, Attack and Fix
- Updated
Dec 21, 2023 - C
A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
- Updated
May 7, 2023 - C
Improve this page
Add a description, image, and links to theuse-after-free topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with theuse-after-free topic, visit your repo's landing page and select "manage topics."