ctfwriteup.com
Search
⌃
K
/home/ret2basic.eth
Web3 Security Research
Curta CTF
Paradigm CTF 2022
Damn Vulnerable DeFi
QuillCTF
Secureum AMAZEX DSS Paris
✅
Flashbots MEV-Share CTF
✅
Capture the Ether
✅
Ethernaut
✅
EVM Puzzles
✅
More EVM Puzzles
✅
unhacked
Red Teaming
vulnlab
Hack The Box
TCM Windows Privilege Escalation Course
✅
TCM Linux Privilege Escalation Course
Game Hacking
Pwnie Island
Pwn
pwn.college
Introduction
Program Interaction
Program Misuse
Assembly Refresher
Shellcoding
Sandboxing
Debugging Refresher
Binary Reverse Engineering
Memory Errors
Exploitation
Return Oriented Programming
Dynamic Allocator Misuse
What is the Heap?
Dangers of the Heap
tcache
Chunks and Metadata
Metadata Corruption
🚩
babyheap
Race Conditions
Kernel Security
Advanced Exploitation
pwnable.kr
ROP Emporium
Jarvis OJ Pwn Xman Series
Crypto
Jarvis OJ Crypto RSA Series
picoCTF
picoCTF 2020 Mini-Competition
picoCTF 2021
picoMini by redpwn
Powered By
GitBook
Dynamic Allocator Misuse
In this module, we are going to cover:
ptmalloc
UAF
Memory Disclosure
Metadata Corruption
tcache
Chunks
Previous
babyrop
Next
What is the Heap?
Last modified
1yr ago