0xSoEasY / ROPemporiumLinks
All ROPemporium binaries categorized by architecture, with solving scripts and custom flags
☆23Updated 2 years ago
Alternatives and similar repositories for ROPemporium
Users that are interested in ROPemporium are comparing it to the libraries listed below
Sorting:
- Linux Kernel N-day Exploit/Analysis.☆67Updated 10 months ago
- Simple script to find kernel objects of a certain size in the Linux kernel☆109Updated 2 years ago
- Binary exploitation by confusing the unwinder☆63Updated 2 years ago
- A tool for automating setup of kernel pwn challenges☆61Updated 3 months ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆63Updated 10 months ago
- A collection of my weggli patterns to facilitate vulnerability research.☆144Updated 3 months ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆95Updated 2 years ago
- Old and new CTFs about Linux kernel exploitation.☆58Updated 3 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated last year
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆105Updated 6 months ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆61Updated 2 years ago
- ☆131Updated 4 months ago
- A collection of curated resources and CVEs I use for research.☆108Updated 4 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆190Updated last year
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆43Updated 3 years ago
- Binarly Vulnerability Research Advisories☆180Updated last month
- ☆45Updated 2 years ago
- Target components for kAFL/Nyx Fuzzer☆32Updated last month
- Leveraging patch diffing to discover new vulnerabilities☆130Updated 10 months ago
- ☆100Updated 3 years ago
- Slides about HyperDbg☆39Updated last month
- Linux & Android Kernel Vulnerability research and exploitation☆53Updated last year
- ☆184Updated 7 months ago
- Files used for reproducing Fuzzware's experiments☆60Updated 2 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- ☆128Updated 9 months ago
- CTF pwn problem writeup☆39Updated 2 years ago
- CTF challenges that I created☆18Updated 3 years ago
- ☆104Updated 2 weeks ago