LMS57 / TempleOfPwn
All Files, Scripts, and exploits can be found here
☆64Updated 4 years ago
Alternatives and similar repositories for TempleOfPwn:
Users that are interested in TempleOfPwn are comparing it to the libraries listed below
- ☆46Updated last year
- A tool for automating setup of kernel pwn challenges☆55Updated 5 months ago
- ASLR bypass without infoleak☆160Updated 3 years ago
- CTFs and solutions for Linux binary exploitation.☆108Updated 10 months ago
- various docs (that are interesting, or not, depending on the point of view...)☆113Updated last year
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Collection of browser challenges☆130Updated 4 years ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 3 years ago
- FSOP Again☆22Updated 3 years ago
- Set of pre-generated pwn.college challenges☆66Updated 2 years ago
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆19Updated 2 years ago
- ☆50Updated 6 years ago
- Easily debug processes running in docker containers☆22Updated 10 months ago
- Write-ups for various CTF☆188Updated last year
- ☆175Updated 2 months ago
- archive of the released challenges from corCTF 2021☆22Updated 3 years ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year
- Linux & Android Kernel Vulnerability research and exploitation☆40Updated last year
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆98Updated 2 months ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆89Updated 2 years ago
- Udemy – Linux Heap Exploitation☆42Updated 3 years ago
- Leveraging patch diffing to discover new vulnerabilities☆119Updated 6 months ago
- list of organizations offering vulnerability research/reverse engineering jobs☆63Updated last month
- ☆162Updated 2 years ago
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆60Updated 3 weeks ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆52Updated last year
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆153Updated 5 months ago
- ☆109Updated 6 months ago
- A GDB+GEF-style debugger for unloading Python pickles☆64Updated 4 months ago
- ☆45Updated 3 years ago