Zerotistic / auto-ropperLinks
auto-ropper
☆17Updated 3 years ago
Alternatives and similar repositories for auto-ropper
Users that are interested in auto-ropper are comparing it to the libraries listed below
Sorting:
- ☆45Updated 3 months ago
- A tool for automating setup of kernel pwn challenges☆60Updated 2 months ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 4 years ago
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆67Updated 7 months ago
- Leveraging patch diffing to discover new vulnerabilities☆137Updated last year
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Updated 10 months ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆94Updated 2 years ago
- CTFs and solutions for Linux binary exploitation.☆111Updated last year
- I will upload challenges I create for various ctf's or educational purposes here.☆24Updated 3 years ago
- ☆54Updated 7 years ago
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆47Updated 3 years ago
- Collection of pwn techniques☆29Updated 3 years ago
- Old and new CTFs about Linux kernel exploitation.☆63Updated 3 years ago
- Static binary instrumentation for windows kernel drivers, to use with winafl☆78Updated 10 months ago
- archive of the released challenges from corCTF 2021☆25Updated 4 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆195Updated last year
- A collection of web browser CTF challenges and solutions.☆32Updated 2 years ago
- ASLR bypass without infoleak☆164Updated 4 years ago
- All Files, Scripts, and exploits can be found here☆71Updated 4 years ago
- ☆149Updated last year
- Our CTF Write-Up / solve scripts☆22Updated 2 years ago
- Writeups for CTFs☆78Updated 4 months ago
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to …☆213Updated this week
- Kernel Read Write Execute☆83Updated last year
- My Personal Reading lists for CVE Writeups☆37Updated 3 years ago
- Target components for kAFL/Nyx Fuzzer☆35Updated 5 months ago
- ☆126Updated 4 months ago
- Slides about HyperDbg☆40Updated 5 months ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆19Updated last year
- Linux Kernel N-day Exploit/Analysis.☆67Updated last year