D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup
☆12Mar 8, 2022Updated 4 years ago
Alternatives and similar repositories for d3ctf2022-pwn-d3bpf-and-v2
Users that are interested in d3ctf2022-pwn-d3bpf-and-v2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cottontail: A LLM-Driven Concolic Execution Engine (Accepted by IEEE S&P'26)☆39Dec 4, 2025Updated 3 months ago
- RealWorld CTF 5th realwrap challenge☆18May 21, 2023Updated 2 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago
- Add debugging tools to an existing initramfs, even if it is for a foreign architecture☆24Aug 28, 2024Updated last year
- An IDA processor for eBPF bytecode☆69Nov 7, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆13Dec 14, 2021Updated 4 years ago
- ☆14Sep 26, 2021Updated 4 years ago
- My-CTF-Challenges☆15Sep 27, 2021Updated 4 years ago
- IDA Debugger Module to Dynamically Synchronize Memory and Registers with third-party Backends (Tenet, Unicorn, GDB, etc.)☆17Nov 10, 2021Updated 4 years ago
- An IDA processor for eBPF bytecode☆52Oct 13, 2021Updated 4 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- attachments and (some) writeups/source code for RWCTF 6th☆126Feb 2, 2024Updated 2 years ago
- Code of paper "EnclaveFuzz: Finding Vulnerabilities in SGX Applications"☆26Jan 1, 2026Updated 2 months ago
- CVE-2021-4204: Linux Kernel eBPF Local Privilege Escalation☆62Mar 19, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆57Aug 6, 2024Updated last year
- ☆25Feb 23, 2022Updated 4 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Jun 26, 2018Updated 7 years ago
- qemu vulnerablity.☆56May 25, 2021Updated 4 years ago
- Kernel exploits and writeups☆17May 11, 2022Updated 3 years ago
- [D^3CTF 2022] pwn-d3guard attachment and official writeup (English & Chinese)☆13Mar 9, 2022Updated 4 years ago
- A library for patching ELFs☆62Dec 4, 2020Updated 5 years ago
- ☆12Apr 28, 2025Updated 11 months ago
- ☆13Aug 22, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- some kernel exploit challenges and cve analysis☆26Nov 30, 2018Updated 7 years ago
- CVE-2024-8381: A SpiderMonkey Interpreter Type Confusion Bug.☆16Feb 12, 2025Updated last year
- 远程探测 remote desktop licensing 服务开放情况,用于 CVE-2024-38077 漏洞快速排查☆12Aug 9, 2024Updated last year
- 华南师范大学计算机学院编译原理课程实验4:LR(0)和SLR(1)文法分析器☆10Dec 21, 2023Updated 2 years ago
- ☆15Jun 10, 2022Updated 3 years ago
- Archive of Balsn CTF 2019☆26Jan 16, 2020Updated 6 years ago
- pwn writeups in ctf☆16Updated this week
- ☆113Jun 19, 2022Updated 3 years ago
- AngrPT recover the Windows Driver's DeviceIoControl Interface and Dependencies for getting higher coverage in Fuzzing Process.☆21Jan 20, 2026Updated 2 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- User-friendly reference finder in IDA☆39Dec 17, 2022Updated 3 years ago
- Examine and discover LoongArch instructions☆23Jul 11, 2025Updated 8 months ago
- ☆13Aug 2, 2020Updated 5 years ago
- BinjaryNinja plugin for a ShellStorm like assembly/disassembly experience☆17Nov 28, 2024Updated last year
- ☆22Jul 29, 2021Updated 4 years ago
- A headless, extendable, multi-session, IDA Pro MCP framework.☆168Mar 15, 2026Updated 2 weeks ago