Nautilus-Institute / quals-2024Links
☆71Updated last year
Alternatives and similar repositories for quals-2024
Users that are interested in quals-2024 are comparing it to the libraries listed below
Sorting:
- a new class of file structure attacks☆50Updated 2 years ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆226Updated 6 months ago
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆72Updated 3 weeks ago
- Linux kernel privilege escalation techniques☆138Updated 10 months ago
- ☆221Updated 2 weeks ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆80Updated 7 months ago
- ☆35Updated last year
- SAEG: Stateful Automatic Exploit Generation, an AEG framework for CGC / RHG and pwnable CTF challenges.☆130Updated 5 months ago
- Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn☆184Updated 4 years ago
- Collection of browser challenges☆137Updated 4 years ago
- ☆18Updated last year
- A bunch of V8 resources (with a security focus)☆36Updated this week
- small cute utils for kernel challenges☆37Updated last year
- Chrome V8 CVE exploits and proof-of-concept scripts written by me, for educational and research purposes only.☆69Updated 10 months ago
- attachments and (some) writeups/source code for RWCTF 6th☆113Updated last year
- attachments and (some) writeups/source code for RWCTF 5th☆56Updated 2 years ago
- CTF write-ups by Maple Mallard Magistrates☆43Updated 6 months ago
- ☆44Updated 2 months ago
- ☆112Updated last year
- a GDB plug-in for inspecting mallocng☆59Updated 10 months ago
- ☆124Updated 2 years ago
- A tool for automating setup of kernel pwn challenges☆58Updated 3 weeks ago
- ☆27Updated 3 years ago
- PAWNYABLE!☆208Updated last year
- ☆18Updated 2 months ago
- CTF pwn problem writeup☆39Updated 2 years ago
- ☆110Updated 7 months ago
- angr tutorial for ctf☆152Updated 4 years ago
- Chrome Renderer 1day RCE via Type Confusion in Async Stack Trace (v8ctf submission)☆79Updated last year
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆21Updated 3 years ago