MaherAzzouzi / LinuxExploitation
CTFs and solutions for Linux binary exploitation.
☆109Updated 8 months ago
Alternatives and similar repositories for LinuxExploitation:
Users that are interested in LinuxExploitation are comparing it to the libraries listed below
- Set of pre-generated pwn.college challenges☆64Updated 2 years ago
- All Files, Scripts, and exploits can be found here☆60Updated 3 years ago
- RE / Binary Exploitation Resources☆67Updated 7 years ago
- Collection of browser challenges☆121Updated 3 years ago
- ☆45Updated last year
- ☆159Updated 2 years ago
- ASLR bypass without infoleak☆158Updated 3 years ago
- My write-ups from various CTFs☆115Updated last year
- Write-ups for various CTF☆185Updated 11 months ago
- ☆86Updated 7 years ago
- Old and new CTFs about Linux kernel exploitation.☆52Updated 2 years ago
- All challenges from DiceCTF 2023☆71Updated 2 years ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆50Updated last year
- ☆16Updated last week
- ☆43Updated 3 years ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 3 years ago
- ☆109Updated 3 months ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆192Updated 2 years ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆87Updated last year
- Collection of pwn techniques☆28Updated 3 years ago
- CTF pwn problem writeup☆38Updated last year
- I will upload challenges I create for various ctf's or educational purposes here.☆23Updated 2 years ago
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆59Updated 7 months ago
- Kernel development & exploitation practice environment.☆218Updated last year
- Windows Pwnable Study☆330Updated 4 years ago
- Let's get familiar with Windows pwn 😎☆43Updated 4 years ago
- CTF write-ups by Maple Mallard Magistrates☆38Updated 2 months ago
- esoteric☆51Updated 4 years ago
- Linux & Android Kernel Vulnerability research and exploitation☆35Updated last year
- auto-ropper☆16Updated 2 years ago