Old and new CTFs about Linux kernel exploitation.
☆64Mar 28, 2022Updated 3 years ago
Alternatives and similar repositories for LinuxKernelExploitation
Users that are interested in LinuxKernelExploitation are comparing it to the libraries listed below
Sorting:
- kernel-pwn and writeup collection☆705Oct 2, 2023Updated 2 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Oct 1, 2013Updated 12 years ago
- A curated collection of scripts for kernel-related devops☆13Nov 23, 2023Updated 2 years ago
- Automated recovery of Linux kernel build configurations☆26Jan 14, 2022Updated 4 years ago
- PAWNYABLE!☆235May 30, 2024Updated last year
- My personnal repository☆10Sep 2, 2025Updated 6 months ago
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- FSOP Again☆36Apr 3, 2022Updated 3 years ago
- An updated collection of resources targeting browser-exploitation.☆829Mar 8, 2021Updated 5 years ago
- Collection of browser challenges☆140May 3, 2021Updated 4 years ago
- Windows Pwnable Study☆410Jun 16, 2025Updated 9 months ago
- Set of pre-generated pwn.college challenges☆68Jan 24, 2023Updated 3 years ago
- ☆103Dec 17, 2025Updated 3 months ago
- A collection of curated resources and CVEs I use for research.☆107Aug 8, 2021Updated 4 years ago
- ☆12Aug 3, 2025Updated 7 months ago
- ☆16Jun 23, 2024Updated last year
- ☆189Feb 8, 2025Updated last year
- CTFs and solutions for Linux binary exploitation.☆113Jun 9, 2024Updated last year
- Everything you need to build and run Linux and Android kernels for exploit development☆101Apr 9, 2024Updated last year
- Binary Ninja plugin for importing symbols to a kernel binary from /proc/kallsyms☆21Oct 3, 2025Updated 5 months ago
- ☆26May 10, 2021Updated 4 years ago
- GEF - GDB Enhanced Features - bata24's fork☆629Updated this week
- Linux & Android Kernel Vulnerability research and exploitation☆62Dec 12, 2023Updated 2 years ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆923May 20, 2024Updated last year
- ☆13Mar 12, 2026Updated last week
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆761Jan 27, 2026Updated last month
- Linux kernel module implementation & exploitation (pwn) labs.☆210Jan 26, 2022Updated 4 years ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆243Dec 23, 2024Updated last year
- repository for kernel exploit practice☆415Nov 12, 2019Updated 6 years ago
- QEMU support for a custom board based on a Microchip ATSAMD21G18A microcontroller (MCU)☆14Jun 10, 2024Updated last year
- Some pwn challenges selected for training and education.☆388Jun 26, 2023Updated 2 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆34Jun 6, 2021Updated 4 years ago
- A collection of links related to VMware escape exploits☆1,495Sep 4, 2024Updated last year
- Analysis and exploitation of an use-after-free in ProFTPd☆12Jun 21, 2023Updated 2 years ago
- A list of curated papers focusing on Network Protocol Fuzzing.☆14Jul 5, 2022Updated 3 years ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆55Dec 8, 2023Updated 2 years ago
- pwntools library implementation in c++☆49Apr 11, 2021Updated 4 years ago
- Static Cross-Entry UAF Detector☆24Apr 28, 2025Updated 10 months ago
- V8 Tutorial PLDI 2019☆78Jul 23, 2019Updated 6 years ago