How to exploit a double free vulnerability in 2021. Use After Free for Dummies
-
Updated
Jan 31, 2025 - Python
How to exploit a double free vulnerability in 2021. Use After Free for Dummies
A powerful Redis exploitation tool that leverages CVE-2025-4984
VFGadget locator to facilitate Counterfeit Object-Oriented Programming (COOP) and Loop-Oriented Programming (LOP) attacks to bypass advanced security protections like Intel CET and Control-Flow Guard (CFG) to achieve Remote Code Execution.
Writeups of some of the Binary Exploitation challenges that I have solved during CTF.
🔍 Explore and test the CVE-2025-49844 (RediShell) vulnerability in Redis with this practical lab environment for secure education and research.
Add a description, image, and links to the use-after-free topic page so that developers can more easily learn about it.
To associate your repository with the use-after-free topic, visit your repo's landing page and select "manage topics."