Challenge Problem #1 - Linux Kernel (NOTE: This code does not reflect the active state of what will be used at competition time, please refer to resources inside of the competition environment)
☆59Apr 3, 2024Updated last year
Alternatives and similar repositories for challenge-001-exemplar
Users that are interested in challenge-001-exemplar are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Jul 2, 2025Updated 8 months ago
- attachment and write up for D^3CTF 2023's pwn challenge - d3kcache☆42Jun 28, 2024Updated last year
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆16Feb 12, 2025Updated last year
- ☆18Nov 7, 2024Updated last year
- python exp of pwnable' problems☆18Feb 5, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Exploit Firefox Vulnerability☆24May 25, 2020Updated 5 years ago
- ☆25Mar 26, 2025Updated last year
- A Large-Scale Automated Program Repair Benchmark of Real-World LLVM Middle-End Bugs☆22Mar 20, 2026Updated last week
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆39Nov 26, 2024Updated last year
- Official Repository of the Entity-based Reinforcement Learning for Autonomous Cyber Defence paper.☆18Jan 24, 2025Updated last year
- ☆13Apr 30, 2016Updated 9 years ago
- DARPA Cyber Grand Challenge Sample Challenges☆331Jun 6, 2018Updated 7 years ago
- A fast and powerful gadget finder and ROP chain generator. A research prototype for the ropbot paper accepted at NDSS'26.☆48Jan 22, 2026Updated 2 months ago
- PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux (ACM CCS 2024)☆16Nov 4, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A custom merge tool for merging Cocos Creator layouts☆13Apr 27, 2017Updated 8 years ago
- LLM-powered system that discovered 62 zero-day vulnerabilities across 26 open source projects. 4th place, DARPA AIxCC.☆96Mar 5, 2026Updated 3 weeks ago
- ☆16Oct 20, 2025Updated 5 months ago
- Security Vulnerability Repair via Concolic Execution and Code Mutations☆19Sep 12, 2024Updated last year
- CodexLeaks: Privacy Leaks from Code Generation Language Models in GitHub Copilot☆11Jul 11, 2023Updated 2 years ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- Buttercup CRS as submitted to the AIxCC Final Competition☆97Jul 14, 2025Updated 8 months ago
- Code and templates required to build the DARPA open catalog.☆18Mar 23, 2016Updated 10 years ago
- A stateful fuzzing engine.☆45Nov 14, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆28Dec 10, 2021Updated 4 years ago
- DARPA Cyber Grand Challenge Linux source code☆18Jul 9, 2015Updated 10 years ago
- My browser pwn collections. Mainly JavaScript engine stuff.☆34Mar 12, 2026Updated 2 weeks ago
- DARPA's Cyber Assured Systems Engineering (CASE) project named Verification Evidence and Resilient Design in Anticipation of Cybersecurit…☆48Aug 22, 2024Updated last year
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago
- [ICML'25] MELON: Provable Defense Against Indirect Prompt Injection Attacks in AI Agents☆24Jul 31, 2025Updated 7 months ago
- ☆56Aug 26, 2022Updated 3 years ago
- ☆35Jun 5, 2023Updated 2 years ago
- ☆13Jan 7, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- KLEE-fl : Compile Project to Bitcode and Try Fuzzing with KLEE .☆31Apr 7, 2019Updated 6 years ago
- SCTF 2023 kernel pwn && CVE-2023-3640☆29Jul 17, 2023Updated 2 years ago
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆70Nov 13, 2025Updated 4 months ago
- This repo contains the source code of the physical layer developed for the DARPA Spectrum Collaboration Challenge (SC2).☆12Nov 21, 2019Updated 6 years ago
- ☆11Mar 26, 2018Updated 8 years ago
- ☆13Dec 14, 2021Updated 4 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆107Feb 12, 2025Updated last year