0xSoEasY / ROPemporium
All ROPemporium binaries categorized by architecture, with solving scripts and custom flags
☆21Updated last year
Related projects ⓘ
Alternatives and complementary repositories for ROPemporium
- A tool for automating setup of kernel pwn challenges☆49Updated 4 months ago
- Linux & Android Kernel Vulnerability research and exploitation☆27Updated 10 months ago
- ☆45Updated last year
- Linux Kernel N-day Exploit/Analysis.☆56Updated 2 weeks ago
- ☆163Updated 8 months ago
- various docs (that are interesting, or not, depending on the point of view...)☆97Updated 10 months ago
- Old and new CTFs about Linux kernel exploitation.☆50Updated 2 years ago
- A collection of my weggli patterns to facilitate vulnerability research.☆92Updated 10 months ago
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆57Updated 4 months ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆95Updated 2 months ago
- All Files, Scripts, and exploits can be found here☆59Updated 3 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆69Updated 2 years ago
- Udemy – Linux Heap Exploitation☆35Updated 3 years ago
- Collection of browser challenges☆120Updated 3 years ago
- archive of the released challenges from corCTF 2021☆22Updated 3 years ago
- Blogpost about optimizing binary-only fuzzing with AFL++☆61Updated last year
- A collection of web browser CTF challenges and solutions.☆25Updated last year
- Use-After-Free in Netfilter nf_tables when processing batch requests CVE-2023-32233☆51Updated last year
- Binary exploitation by confusing the unwinder☆59Updated last year
- ☆107Updated this week
- ☆134Updated last week
- ☆100Updated last month
- ☆113Updated 7 months ago
- ☆98Updated 2 years ago
- Protocol Reverse Engineering Resources☆19Updated last year
- Damn Vulenerable Kernel Module for kernel fuzzing☆47Updated 2 weeks ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆25Updated 11 months ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆62Updated 2 months ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆59Updated 7 months ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆181Updated 7 months ago