M0ngi / Kernel-Exploitation-NotesLinks
☆19Updated last year
Alternatives and similar repositories for Kernel-Exploitation-Notes
Users that are interested in Kernel-Exploitation-Notes are comparing it to the libraries listed below
Sorting:
- MCP for Pwn☆179Updated 3 weeks ago
- ASLR bypass without infoleak☆164Updated 4 years ago
- list of organizations offering vulnerability research/reverse engineering jobs☆101Updated 3 months ago
- ☆50Updated 3 years ago
- Source code and solution of CTF challenges that I created.☆45Updated 6 months ago
- Source for challenges from bi0sCTF☆48Updated 6 months ago
- All Files, Scripts, and exploits can be found here☆72Updated 4 years ago
- An automatic Blind ROP exploitation tool☆206Updated 2 years ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆170Updated last year
- Challenges, source code, and writeups for BYUCTF 2023☆27Updated 2 years ago
- Reverse Engineering challenges☆36Updated 5 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Updated 10 months ago
- This is a comprehensive collection of challenges from past CTF competitions. The challenges are stored with REHOST details and can be run…☆74Updated last week
- 🐛 UCLA ACM Cyber's Fuzzing Lab☆87Updated last month
- Slides and videos from my public speeches / conferences☆78Updated 3 weeks ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆58Updated 2 years ago
- Challenges and write-ups for GCC-CTF 2024☆19Updated last year
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆216Updated last year
- ☆22Updated 3 weeks ago
- This repository will serve as the "master" repo containing all exploit code and notes in regards to the Modern Binary Exploitation course…☆53Updated 2 years ago
- The most complete code auditing platform with thousands of real-world challenges☆134Updated 6 months ago
- ☆17Updated last year
- gemastik-xvi-final public repository☆16Updated 2 years ago
- A collection of web browser CTF challenges and solutions.☆32Updated 3 years ago
- Files + Solutions for DownUnderCTF 2024 Challenges☆117Updated last year
- Scriptable CLI debugger for windows, inspired by pwndbg ❤☆96Updated 2 months ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆63Updated 2 years ago
- ☆55Updated 7 years ago
- Udemy – Linux Heap Exploitation☆53Updated 4 years ago
- Binary Exploitation Phrack CTF Challenge☆139Updated 4 months ago