Old and new CTFs about Linux kernel exploitation.
☆64Mar 28, 2022Updated 4 years ago
Alternatives and similar repositories for LinuxKernelExploitation
Users that are interested in LinuxKernelExploitation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- kernel-pwn and writeup collection☆718Oct 2, 2023Updated 2 years ago
- Source code for building an exploitable linux kernel challenge iso.☆46Oct 1, 2013Updated 12 years ago
- A curated collection of scripts for kernel-related devops☆14Nov 23, 2023Updated 2 years ago
- pwn.college challenges☆24May 12, 2026Updated last week
- Automated recovery of Linux kernel build configurations☆26Jan 14, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- PAWNYABLE!☆237May 30, 2024Updated last year
- My personnal repository☆10Sep 2, 2025Updated 8 months ago
- I am still working on it☆11Apr 30, 2020Updated 6 years ago
- FSOP Again☆36Apr 3, 2022Updated 4 years ago
- An updated collection of resources targeting browser-exploitation.☆834Mar 8, 2021Updated 5 years ago
- Collection of browser challenges☆137May 3, 2021Updated 5 years ago
- Windows Pwnable Study☆418Jun 16, 2025Updated 11 months ago
- Set of pre-generated pwn.college challenges☆68Jan 24, 2023Updated 3 years ago
- A collection of curated resources and CVEs I use for research.☆107Aug 8, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆105Dec 17, 2025Updated 5 months ago
- ☆12Aug 3, 2025Updated 9 months ago
- ☆189Feb 8, 2025Updated last year
- CTFs and solutions for Linux binary exploitation.☆111Jun 9, 2024Updated last year
- Binary Ninja plugin for importing symbols to a kernel binary from /proc/kallsyms☆21Oct 3, 2025Updated 7 months ago
- Everything you need to build and run Linux and Android kernels for exploit development☆102Apr 9, 2024Updated 2 years ago
- ☆16Jun 23, 2024Updated last year
- ☆25May 10, 2021Updated 5 years ago
- GEF - GDB Enhanced Features - bata24's fork☆646May 9, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆921May 20, 2024Updated 2 years ago
- ☆13Mar 12, 2026Updated 2 months ago
- Linux & Android Kernel Vulnerability research and exploitation☆66Dec 12, 2023Updated 2 years ago
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆766Jan 27, 2026Updated 3 months ago
- Linux kernel module implementation & exploitation (pwn) labs.☆212Jan 26, 2022Updated 4 years ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆244Dec 23, 2024Updated last year
- repository for kernel exploit practice☆418Nov 12, 2019Updated 6 years ago
- QEMU support for a custom board based on a Microchip ATSAMD21G18A microcontroller (MCU)☆14Jun 10, 2024Updated last year
- Some pwn challenges selected for training and education.☆387Jun 26, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A fast binary coverage measurement tool based on AFL's Qemu mode☆33Jun 6, 2021Updated 4 years ago
- A collection of links related to VMware escape exploits☆1,490Sep 4, 2024Updated last year
- Analysis and exploitation of an use-after-free in ProFTPd☆14Jun 21, 2023Updated 2 years ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆54Dec 8, 2023Updated 2 years ago
- A list of curated papers focusing on Network Protocol Fuzzing.☆14Jul 5, 2022Updated 3 years ago
- pwntools library implementation in c++☆49Apr 11, 2021Updated 5 years ago
- Static Cross-Entry UAF Detector☆26Apr 28, 2025Updated last year