Examples for: Learning KVM - implement your own kernel
☆380Sep 3, 2023Updated 2 years ago
Alternatives and similar repositories for kvm-kernel-example
Users that are interested in kvm-kernel-example are comparing it to the libraries listed below
Sorting:
- A minimal kvm example☆516Jul 30, 2022Updated 3 years ago
- TokyoWestens CTF 4th 2018 EscapeMe challenge☆89Sep 5, 2018Updated 7 years ago
- ☆286Apr 23, 2020Updated 5 years ago
- minivm based on kvm☆158Jun 7, 2024Updated last year
- Collection of scripts and writeups☆321Dec 14, 2021Updated 4 years ago
- Stand-alone Native Linux KVM Tool repo☆607Oct 8, 2024Updated last year
- Heap exploitation technique bypassing heap ASLR☆49Sep 2, 2019Updated 6 years ago
- ☆176May 2, 2019Updated 6 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆522Jun 28, 2024Updated last year
- Some CTF write up☆255Aug 29, 2025Updated 6 months ago
- gdb plugin for linux kernel to debug slub☆52May 11, 2020Updated 5 years ago
- share some useful archives about vm and qemu escape exploit.☆583Apr 12, 2024Updated last year
- VirtualBox 3D exploits & PoCs☆162Jan 24, 2019Updated 7 years ago
- Improving AFL by using Intel PT to collect branch information☆292Jul 26, 2019Updated 6 years ago
- Some of my CTF solutions☆80May 13, 2019Updated 6 years ago
- ☆40Dec 29, 2017Updated 8 years ago
- ☆201Mar 9, 2023Updated 2 years ago
- WCTF 2019 challenge☆103Jul 9, 2019Updated 6 years ago
- Source code and exploits for some 35c3ctf challenges.☆143Dec 30, 2018Updated 7 years ago
- QASan is a custom QEMU 3.1.1 that detects memory errors in the guest using AddressSanitizer.☆350Jul 30, 2024Updated last year
- V8 Tutorial PLDI 2019☆78Jul 23, 2019Updated 6 years ago
- WCTF 2019 Onsite(Master) Challenge☆53Jul 8, 2019Updated 6 years ago
- Stateless Network Fuzzer for QEMU (Targeting SLiRP)☆17Oct 19, 2020Updated 5 years ago
- Python module to help in exploitation of the FILE structure in C☆27Dec 2, 2018Updated 7 years ago
- Write-ups from A*0*E.☆199May 12, 2020Updated 5 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆129Jun 25, 2017Updated 8 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- RetroWrite -- Retrofitting compiler passes through binary rewriting☆736Apr 26, 2025Updated 10 months ago
- 2019 Advent Calendar, vmware pwnables☆50Jul 21, 2020Updated 5 years ago
- ☆47Dec 29, 2018Updated 7 years ago
- Provide powerful tools for seccomp analysis☆1,096Updated this week
- A python library to find one-gadget☆30Feb 22, 2019Updated 7 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆225Sep 16, 2020Updated 5 years ago
- A series of posts about QEMU internals:☆1,514Nov 3, 2023Updated 2 years ago
- Learn how to combine libprotobuf-mutator with libfuzzer & AFL++☆258Sep 24, 2024Updated last year
- ☆227Dec 9, 2020Updated 5 years ago
- Source code of a multiple series of tutorials about the hypervisor. Available at: https://rayanfam.com/tutorials☆2,512Aug 17, 2025Updated 6 months ago
- Linux Heap Exploitation Practice☆395Dec 1, 2018Updated 7 years ago