A simple framework for developing Linux kernel heap exploit techniques
☆114Jul 24, 2020Updated 5 years ago
Alternatives and similar repositories for libplayground
Users that are interested in libplayground are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Remote kernel exploit for ROSE amateur radio☆24Aug 8, 2011Updated 14 years ago
- ropc-llvm is a PoC of a Turing complete ROP compiler with support for a subset of LLVM IR. It is an extension of ropc.☆69Oct 3, 2013Updated 12 years ago
- covFuzz☆34Jun 8, 2017Updated 8 years ago
- Surku is a general-purpose mutation-based fuzzer.☆79Jul 24, 2022Updated 3 years ago
- An x86 linux syscall table reference tool. Handy for when writing shellcode and exploits.☆35May 7, 2015Updated 10 years ago
- Linux kernel JIT spray for SMEP / KERNEXEC bypass☆55Nov 18, 2012Updated 13 years ago
- My KVM breakout code from my DEFCON/Black Hat 2011 presentation☆35Apr 9, 2014Updated 11 years ago
- Python wrapper for DbgEng☆39Nov 21, 2016Updated 9 years ago
- elgoog/searchme challenge from 34C3 CTF / WCTF 2018: sources & exploit☆68Jul 9, 2018Updated 7 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- A gdbinit file that makes gdb much more usable for MIPS debugging.☆38Sep 5, 2012Updated 13 years ago
- Some stuffs for CODE BLUE 2016☆23Oct 26, 2016Updated 9 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- CTF exploit development and other tools of pwnage☆19May 30, 2019Updated 6 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38May 29, 2018Updated 7 years ago
- PIN tool runtracer suite☆43Sep 14, 2015Updated 10 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Oct 1, 2013Updated 12 years ago
- x86_64 linux rootkit using debug registers☆53Jan 11, 2022Updated 4 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 11 years ago
- CansecWest2016 - Getting Physical: Extreme Abuse of Intel Based Paging Systems☆28Apr 26, 2016Updated 9 years ago
- PEDAL - Python Exploit Development Assistance for GDB Lite☆33Oct 27, 2019Updated 6 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Mar 12, 2014Updated 12 years ago
- ☆159Feb 23, 2015Updated 11 years ago
- Control Flow Guard bypass using LoadLibrary and IsBadCodePtr☆46Jan 19, 2017Updated 9 years ago
- Precise Code Tracking (Vim)☆32Sep 9, 2016Updated 9 years ago
- Utilities for automated crash sample processing/analysis, easy afl-fuzz job management and corpus optimization☆419Jun 6, 2018Updated 7 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Sep 12, 2019Updated 6 years ago
- Library for Dissect and Infect ELF Binaries.☆40Apr 27, 2025Updated 10 months ago
- Functions Catalog☆28Jul 10, 2019Updated 6 years ago
- PS3 payloads for PSGroove/PSFreedom/Other in order to 'jailbreak' the PS3☆116Oct 18, 2020Updated 5 years ago
- ☆89Dec 30, 2018Updated 7 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Jun 15, 2018Updated 7 years ago
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago
- reverse engineering, visual binary analysis☆24Jan 9, 2017Updated 9 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- Sequitur (context free grammar) fuzzer, maximum code coverage/set covering, plus other tools.☆19Jan 27, 2011Updated 15 years ago