chujDK / d3ctf2022-pwn-d3bpf-and-v2Links
D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup
☆11Updated 3 years ago
Alternatives and similar repositories for d3ctf2022-pwn-d3bpf-and-v2
Users that are interested in d3ctf2022-pwn-d3bpf-and-v2 are comparing it to the libraries listed below
Sorting:
- ☆39Updated 2 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆83Updated 3 years ago
- ☆25Updated 4 years ago
- My-CTF-Challenges☆15Updated 3 years ago
- gdb plugin for linux kernel to debug slub☆52Updated 5 years ago
- attachment and write up for D^3CTF 2023's pwn challenge - d3kcache☆40Updated last year
- GDB plug-in that helps exploiting the Linux kernel's SLUB allocator☆90Updated 2 years ago
- A gdb plugin for linux kernel.☆28Updated 2 years ago
- SCTF 2023 kernel pwn && CVE-2023-3640☆26Updated last year
- AFLplusplus + libprotobuf-mutator = love☆83Updated 5 years ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆82Updated 7 months ago
- ☆46Updated 3 years ago
- a new class of file structure attacks☆53Updated 2 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆94Updated 3 years ago
- qemu vulnerablity.☆53Updated 4 years ago
- ☆78Updated last year
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆60Updated last year
- GDB plug-in that helps exploiting the Linux kernel's SLUB allocator☆9Updated 4 years ago
- QEMU escape code☆62Updated 4 years ago
- uacatcher open source repo☆21Updated last year
- ☆35Updated 3 years ago
- ☆37Updated last year
- Add debugging tools to an existing initramfs, even if it is for a foreign architecture☆23Updated 10 months ago
- Linux kernel privilege escalation techniques☆137Updated 11 months ago
- a GDB plug-in for inspecting mallocng☆59Updated 11 months ago
- SyzScope is a research project that aims to reveal high-risk security bugs on Syzbot. Learn more details in our paper.☆80Updated 5 months ago
- linux kernel cross page attack demo module☆30Updated 2 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆43Updated last year
- ☆36Updated last year
- ☆24Updated last year