Myldero / kernelinit
A tool for automating setup of kernel pwn challenges
☆55Updated 3 months ago
Alternatives and similar repositories for kernelinit:
Users that are interested in kernelinit are comparing it to the libraries listed below
- a new class of file structure attacks☆48Updated 2 years ago
- various docs (that are interesting, or not, depending on the point of view...)☆105Updated last year
- ☆45Updated last year
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆71Updated 3 months ago
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆41Updated 2 years ago
- ☆168Updated last month
- ☆172Updated 2 weeks ago
- archive of the released challenges from corCTF 2021☆22Updated 3 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆98Updated last month
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆213Updated 2 months ago
- Collection of browser challenges☆126Updated 3 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆183Updated 11 months ago
- All Files, Scripts, and exploits can be found here☆61Updated 3 years ago
- small cute utils for kernel challenges☆32Updated 10 months ago
- Easily debug processes running in docker containers☆22Updated 8 months ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 3 years ago
- A GDB+GEF-style debugger for unloading Python pickles☆63Updated 2 months ago
- Extendable Visualization & Exploitation tool for glibc heap☆56Updated 7 months ago
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆57Updated last week
- ☆35Updated 10 months ago
- ASLR bypass without infoleak☆159Updated 3 years ago
- ☆109Updated 4 months ago
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆61Updated 8 months ago
- Linux kernel privilege escalation techniques☆127Updated 7 months ago
- LiveCTF challenges and infrastructure at DEFCON 32 CTF☆17Updated 6 months ago
- Exploit for Real World CTF 6th RIPTC.☆33Updated last year
- CTF pwn problem writeup☆37Updated last year
- Simple script to find kernel objects of a certain size in the Linux kernel☆108Updated 2 years ago
- Udemy – Linux Heap Exploitation☆38Updated 3 years ago
- Repo for talk slides & materials☆16Updated 3 months ago