A tutorial on how to exploit a double-free vulnerability, focused on binary exploitation and security research.
1.4K
Stars
66
Forks
Oct 26, 2021
Created
Jan 31, 2025
Last Updated
+0.1% change
stars per day
Normal engagement
stars/day over 1.6K days
Curated list of hacking and security resources for developers
Comprehensive payloads and bypasses for web app security and pentesting
SecLists provides security testing lists for assessments.
Reverse engineering framework for analyzing compiled code
Sign in to leave a comment or vote
Sign InNo comments yet. Be the first to comment!
Get weekly updates on trending AI coding tools and projects.