drw0if / LazyFP-PoC
PoC for the LazyFP vulnerability
☆11Updated 2 years ago
Alternatives and similar repositories for LazyFP-PoC
Users that are interested in LazyFP-PoC are comparing it to the libraries listed below
Sorting:
- Kernel PWN Tooklkit aimed mainly for CTF players☆16Updated 9 months ago
- Source code and documentation for TeamItaly CTF 2022 challenges☆40Updated last year
- Automatic tool to quickly start a pwn CTF challenge☆43Updated last year
- A Python library to debug binary executables, your own way.☆202Updated this week
- TCP flow analyzer with sugar for A/D CTF☆139Updated 2 years ago
- All Files, Scripts, and exploits can be found here☆64Updated 4 years ago
- Many-Time Pad Interactive☆171Updated last year
- ☆90Updated last year
- A full English version of the popular ctf-wiki☆93Updated 10 months ago
- 'Ike: A binary exploitation and reversing handbook.☆76Updated 3 months ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆475Updated this week
- 📢 🔒 Exploit manager for attack-defense CTF competitions☆315Updated 2 years ago
- ☆12Updated 11 months ago
- 🐉 Export ghidra decompiled code to dwarf sections inside ELF binary☆194Updated last year
- A flag submitter service with distributed attackers for attack/defense CTF games.☆73Updated 6 years ago
- Python library for CTFer☆143Updated 3 weeks ago
- kernel-pwn and writeup collection☆614Updated last year
- My write-ups from various CTFs☆118Updated last year
- An Intrusion Prevention System for Attack-Defense CTFs☆44Updated 9 months ago
- ☆163Updated 2 years ago
- Kernel development & exploitation practice environment.☆231Updated last year
- ☆159Updated 4 months ago
- Source code of the challenges developed for the 2024 edition of openECSC☆71Updated 7 months ago
- Network analysis tool for Attack Defence CTF☆319Updated 9 months ago
- FSOP Again☆22Updated 3 years ago
- ☆46Updated last year
- various docs (that are interesting, or not, depending on the point of view...)☆113Updated last year
- Repository with the material of the Tower of Hanoi introductory briefings on binary exploitation☆23Updated 9 years ago
- Old and new CTFs about Linux kernel exploitation.☆54Updated 3 years ago
- Network traffic analysis tool for Attack & Defense CTF's☆58Updated last week