Examples for: Learning KVM - implement your own kernel
☆381Sep 3, 2023Updated 2 years ago
Alternatives and similar repositories for kvm-kernel-example
Users that are interested in kvm-kernel-example are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A minimal kvm example☆519Jul 30, 2022Updated 3 years ago
- TokyoWestens CTF 4th 2018 EscapeMe challenge☆89Sep 5, 2018Updated 7 years ago
- minivm based on kvm☆157Jun 7, 2024Updated last year
- ☆286Apr 23, 2020Updated 5 years ago
- Collection of scripts and writeups☆321Dec 14, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Stand-alone Native Linux KVM Tool repo☆617Oct 8, 2024Updated last year
- Heap exploitation technique bypassing heap ASLR☆49Sep 2, 2019Updated 6 years ago
- gdb plugin for linux kernel to debug slub☆52May 11, 2020Updated 5 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- VirtualBox 3D exploits & PoCs☆163Jan 24, 2019Updated 7 years ago
- share some useful archives about vm and qemu escape exploit.☆585Mar 18, 2026Updated 3 weeks ago
- ☆176May 2, 2019Updated 6 years ago
- Hacks and experiments for the linux kernel VM subsystem.☆23Jun 4, 2022Updated 3 years ago
- WCTF 2019 Onsite(Master) Challenge☆54Jul 8, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Some CTF write up☆256Aug 29, 2025Updated 7 months ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆522Jun 28, 2024Updated last year
- Some of my CTF solutions☆80May 13, 2019Updated 6 years ago
- Stateless Network Fuzzer for QEMU (Targeting SLiRP)☆17Oct 19, 2020Updated 5 years ago
- Improving AFL by using Intel PT to collect branch information☆293Jul 26, 2019Updated 6 years ago
- ☆40Dec 29, 2017Updated 8 years ago
- Write-ups from A*0*E.☆199May 12, 2020Updated 5 years ago
- Merge multi binaries into one IDA database.☆24Jan 18, 2022Updated 4 years ago
- 2019 Advent Calendar, vmware pwnables☆50Jul 21, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- V8 Tutorial PLDI 2019☆78Jul 23, 2019Updated 6 years ago
- QASan is a custom QEMU 3.1.1 that detects memory errors in the guest using AddressSanitizer.☆351Jul 30, 2024Updated last year
- Source code and exploits for some 35c3ctf challenges.☆143Dec 30, 2018Updated 7 years ago
- ☆41Jan 26, 2024Updated 2 years ago
- WCTF 2019 challenge☆103Jul 9, 2019Updated 6 years ago
- A python library to find one-gadget☆31Feb 22, 2019Updated 7 years ago
- RetroWrite -- Retrofitting compiler passes through binary rewriting☆742Apr 26, 2025Updated 11 months ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- A series of posts about QEMU internals:☆1,523Nov 3, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Python module to help in exploitation of the FILE structure in C☆27Dec 2, 2018Updated 7 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆224Sep 16, 2020Updated 5 years ago
- ☆202Mar 9, 2023Updated 3 years ago
- All virtualization escape challenges and writeups in RealWorldCTF☆89Jan 14, 2019Updated 7 years ago
- Provide powerful tools for seccomp analysis☆1,107Updated this week
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆130Jun 25, 2017Updated 8 years ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆147Jan 23, 2021Updated 5 years ago