Lazenca / Kernel-exploit-tech
Linux Kernel exploitation Tutorial.
☆267Updated 4 years ago
Alternatives and similar repositories for Kernel-exploit-tech:
Users that are interested in Kernel-exploit-tech are comparing it to the libraries listed below
- Fuzzing Unification Framework☆372Updated last month
- ChaetSheet for Pwn Reversing of CTF☆32Updated 4 years ago
- PAWNYABLE!☆204Updated 9 months ago
- CTF Reversing Challenges List☆271Updated 5 years ago
- Security Camp 2021 & GCC 2022☆113Updated 2 years ago
- Extension for GDB☆106Updated 10 months ago
- repository for kernel exploit practice☆393Updated 5 years ago
- Example files to experience basic exploit techniques.☆73Updated 5 years ago
- Reversing list☆147Updated last year
- my writeups (mainly pwnable)☆33Updated 5 months ago
- Python library for CTFer☆133Updated last month
- kernel-pwn and writeup collection☆595Updated last year
- Tutorial for writing kernel exploits☆251Updated 7 years ago
- Collection of scripts and writeups☆320Updated 3 years ago
- The full set of files that supported TSG CTF challenges☆30Updated 5 years ago
- Code and exercises for a workshop on z3 and angr☆225Updated 4 years ago
- Kernel Fuzzer for Xen Project (KF/x) - Hypervisor-based fuzzing using Xen VM forking, VMI & AFL☆470Updated 7 months ago
- 🔍Heap analysis tool for CTF pwn.☆221Updated 3 years ago
- How to build an efficient pwn development environment in 2020☆260Updated 4 years ago
- Some CTF write up☆245Updated 3 years ago
- A happy heap editor to support your exploitation process☆195Updated 3 years ago
- ☆56Updated 7 years ago
- Linux Heap Exploitation Practice☆378Updated 6 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆396Updated 4 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆149Updated 4 years ago
- An updated collection of resources targeting browser-exploitation.☆814Updated 3 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆183Updated 11 months ago
- Vulnerability examples.☆402Updated 10 months ago
- Use angr inside GDB. Create an angr state from the current debugger state.☆199Updated 4 years ago
- ☆112Updated 7 years ago