decompetition / challenges-2021Links
☆22Updated 3 years ago
Alternatives and similar repositories for challenges-2021
Users that are interested in challenges-2021 are comparing it to the libraries listed below
Sorting:
- Symbolic execution engine for Whitespace.☆13Updated 4 years ago
- ☆16Updated 4 years ago
- a new class of file structure attacks☆58Updated 3 years ago
- attachment and write up for D^3CTF 2023's pwn challenge - d3kcache☆41Updated last year
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91Updated 3 years ago
- ☆40Updated last week
- SCTF 2023 kernel pwn && CVE-2023-3640☆29Updated 2 years ago
- ☆39Updated last year
- An IDA processor for eBPF bytecode☆52Updated 4 years ago
- Raw IDA Kernel API for IDAPython☆34Updated 3 years ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆101Updated 3 weeks ago
- AFL bindings for Unicorn-Engine☆89Updated 4 months ago
- Docker image for RISC-V 32/64 development environment, along with Qemu☆25Updated 3 years ago
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆11Updated 3 years ago
- MBA-Blast is a tool for simplification of MBA expressions.☆70Updated 4 years ago
- ☆34Updated last month
- qemu vulnerablity.☆55Updated 4 years ago
- Symbolic Execution Engine based on Ghidra's PCode☆84Updated 2 years ago
- This tool can be useful for solving some reversing challenges in CTFs events.☆15Updated 4 years ago
- gdb plugin for linux kernel to debug slub☆52Updated 5 years ago
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆69Updated 2 months ago
- Ghidra/IDA Pro plugins to load similarity result from binaryai.net☆93Updated 2 years ago
- ☆46Updated 4 years ago
- A Linux Kernel Exploitation C Library☆19Updated 3 months ago
- The SAILR paper's evaluation pipline for measuring the quality of decompilation☆117Updated last year
- linux kernel cross page attack demo module☆31Updated 2 years ago
- A fast and powerful gadget finder and ROP chain generator. A research prototype for the ropbot paper accepted at NDSS'26.☆39Updated 2 weeks ago
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆51Updated 3 years ago
- A tool combining DWARF info and source to search for kernel heap objects☆24Updated last month
- Run IDA scripts headlessly.☆226Updated 5 months ago