Skip to main content

All Questions

4votes
2answers
1kviews

Good example of heap exploits on Linux

I'm doing a demonstration of memory corruption attacks, and would like to show some working examples of exploits that feature heap corruption (such as use-after-free). My requirements are: A working ...
SRobertJames's user avatar

close