0xSoEasY / ROPemporium
All ROPemporium binaries categorized by architecture, with solving scripts and custom flags
☆21Updated last year
Alternatives and similar repositories for ROPemporium:
Users that are interested in ROPemporium are comparing it to the libraries listed below
- A tool for automating setup of kernel pwn challenges☆53Updated 2 months ago
- ☆45Updated last year
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- Linux & Android Kernel Vulnerability research and exploitation☆32Updated last year
- Simple script to find kernel objects of a certain size in the Linux kernel☆107Updated 2 years ago
- Old and new CTFs about Linux kernel exploitation.☆52Updated 2 years ago
- Target components for kAFL/Nyx Fuzzer☆27Updated 5 months ago
- A collection of my weggli patterns to facilitate vulnerability research.☆94Updated last year
- ☆29Updated 3 weeks ago
- a new class of file structure attacks☆46Updated 2 years ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 3 years ago
- Use-After-Free in Netfilter nf_tables when processing batch requests CVE-2023-32233☆51Updated last year
- Repo for talk slides & materials☆15Updated 2 months ago
- Protocol Reverse Engineering Resources☆20Updated last year
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆40Updated 2 years ago
- ☆17Updated last month
- ☆167Updated 11 months ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆97Updated 4 months ago
- Kernel Read Write Execute☆40Updated 2 weeks ago
- Linux Kernel N-day Exploit/Analysis.☆63Updated 3 months ago
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆48Updated 3 weeks ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆26Updated 2 weeks ago
- Blogpost about optimizing binary-only fuzzing with AFL++☆63Updated last year
- All Files, Scripts, and exploits can be found here☆60Updated 3 years ago
- ☆163Updated 2 weeks ago
- ☆34Updated 8 months ago
- Linux kernel privilege escalation techniques☆123Updated 5 months ago
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆54Updated 9 months ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 2 years ago
- ☆80Updated 2 years ago