How to exploit a double free vulnerability in 2021. Use After Free for Dummies
-
Updated
Jan 31, 2025 - Python
How to exploit a double free vulnerability in 2021. Use After Free for Dummies
Writeups of some of the Binary Exploitation challenges that I have solved during CTF.
VFGadget locator to facilitate Counterfeit Object-Oriented Programming (COOP) and Loop-Oriented Programming (LOP) attacks to bypass advanced security protections like Intel CET and Control-Flow Guard (CFG) to achieve Remote Code Execution.
Add a description, image, and links to the use-after-free topic page so that developers can more easily learn about it.
To associate your repository with the use-after-free topic, visit your repo's landing page and select "manage topics."