Zerotistic / auto-ropper
auto-ropper
☆16Updated 2 years ago
Related projects: ⓘ
- ☆45Updated last year
- I will upload challenges I create for various ctf's or educational purposes here.☆22Updated 2 years ago
- A tool for automating setup of kernel pwn challenges☆48Updated 3 months ago
- ☆44Updated 5 years ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 2 years ago
- Our CTF Write-Up / solve scripts☆20Updated last year
- FSOP Again☆18Updated 2 years ago
- various docs (that are interesting, or not, depending on the point of view...)☆89Updated 8 months ago
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆43Updated 3 months ago
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆15Updated 2 years ago
- A javascript dll resolver for v8☆11Updated 4 years ago
- A library for patching ELFs☆52Updated 3 years ago
- All Files, Scripts, and exploits can be found here☆58Updated 3 years ago
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆37Updated 2 years ago
- ☆24Updated 3 years ago
- ☆41Updated 2 years ago
- ☆71Updated 5 months ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆95Updated 2 weeks ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆84Updated last month
- Linux & Android Kernel Vulnerability research and exploitation☆26Updated 9 months ago
- Easily debug processes running in docker containers☆21Updated 2 months ago
- Collection of pwn techniques☆25Updated 2 years ago
- Syscall hooking for reverse-engineering and anti-debug bypass on Linux x86 32/64☆39Updated 4 years ago
- archive of the released challenges from corCTF 2021☆22Updated 3 years ago
- CTFs and solutions for Linux binary exploitation.☆106Updated 3 months ago
- Writeups for CTF challenges☆28Updated 10 months ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆139Updated 3 years ago
- Leveraging patch diffing to discover new vulnerabilities☆101Updated last year
- Set of pre-generated pwn.college challenges☆58Updated last year
- Cross-architecture instruction counting for CTF solving☆42Updated 2 years ago