decompetition / challenges-2021Links
☆22Updated 3 years ago
Alternatives and similar repositories for challenges-2021
Users that are interested in challenges-2021 are comparing it to the libraries listed below
Sorting:
- Symbolic execution engine for Whitespace.☆13Updated 4 years ago
- ☆16Updated 4 years ago
- a new class of file structure attacks☆57Updated 3 years ago
- ☆40Updated 5 months ago
- SCTF 2023 kernel pwn && CVE-2023-3640☆29Updated 2 years ago
- attachment and write up for D^3CTF 2023's pwn challenge - d3kcache☆41Updated last year
- ☆34Updated 3 weeks ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91Updated 3 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- ☆39Updated last year
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆101Updated last week
- Docker image for RISC-V 32/64 development environment, along with Qemu☆25Updated 3 years ago
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆11Updated 3 years ago
- MBA-Blast is a tool for simplification of MBA expressions.☆70Updated 4 years ago
- This tool can be useful for solving some reversing challenges in CTFs events.☆15Updated 4 years ago
- Ghidra/IDA Pro plugins to load similarity result from binaryai.net☆93Updated 2 years ago
- An IDA processor for eBPF bytecode☆52Updated 4 years ago
- uacatcher open source repo☆22Updated 2 years ago
- Raw IDA Kernel API for IDAPython☆34Updated 3 years ago
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆68Updated 2 months ago
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆51Updated 3 years ago
- ☆46Updated 3 years ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆19Updated last year
- AFL bindings for Unicorn-Engine☆87Updated 4 months ago
- Run IDA scripts headlessly.☆223Updated 4 months ago
- A fast and powerful gadget finder and ROP chain generator. A research prototype for the ropbot paper accepted at NDSS'26.☆37Updated 3 weeks ago
- ☆12Updated 3 years ago
- A tool combining DWARF info and source to search for kernel heap objects☆24Updated 3 weeks ago
- qemu vulnerablity.☆54Updated 4 years ago
- ☆36Updated 4 years ago