Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.
☆22Oct 20, 2019Updated 6 years ago
Alternatives and similar repositories for r2con2019-ctf-kernel
Users that are interested in r2con2019-ctf-kernel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My CTF writeups☆27Jul 22, 2021Updated 4 years ago
- My notes about Genyatyk VM crackme☆26Jun 27, 2020Updated 5 years ago
- Stuff related with piracy☆10Oct 7, 2020Updated 5 years ago
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- Investigating the bug behind CVE-2021-26708☆28Feb 16, 2021Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Various PoCs and challenges regarding heap userland exploitation☆54Jun 15, 2018Updated 7 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- RWX CTF Team Writeups☆10Dec 24, 2019Updated 6 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆75May 21, 2021Updated 4 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- A PCode Emulator for Ghidra.☆113Feb 7, 2021Updated 5 years ago
- Crackme challenge☆17Nov 20, 2020Updated 5 years ago
- Challenges and vulnerabilities exploitation.☆60Dec 26, 2020Updated 5 years ago
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 日前我发现了D-Link DIR 880L/865L/868L/860L路由器存在多个XSS和命令注入漏洞,最主要的问题是路由器未对用户输入进行检查,导致恶意数据请求被执行,最终被远程攻击者控制整个设备。☆11Mar 2, 2018Updated 8 years ago
- ☆13Dec 29, 2022Updated 3 years ago
- QuickPatch: A patching tool☆13Oct 20, 2019Updated 6 years ago
- ☆37Jun 7, 2019Updated 6 years ago
- ☆35Oct 25, 2021Updated 4 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆305Jan 2, 2023Updated 3 years ago
- Writeups for the RHME3 Challenges☆53Jan 7, 2019Updated 7 years ago
- A reimplementation of GNU readelf, using Ryan O'Neill's innovative library, libelfmaster.☆10Sep 28, 2019Updated 6 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆32Apr 19, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆35Dec 2, 2018Updated 7 years ago
- Tasteless CTF 2019☆20Nov 6, 2019Updated 6 years ago
- ☆22Dec 1, 2025Updated 3 months ago
- ☆12May 2, 2017Updated 8 years ago
- Sample WinDbg extension☆15Jun 21, 2019Updated 6 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91May 7, 2024Updated last year
- View Linux perf traces in IDA Pro☆15Nov 18, 2019Updated 6 years ago
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 5 months ago
- A GUI fuzzing application set up to fuzz calc.exe right now☆37Aug 12, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Collection of images and examples to use with Shoggoth.☆19Aug 24, 2020Updated 5 years ago
- The radare2 + frida book for Mobile Application assessment☆40Jan 11, 2019Updated 7 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- My scripts for Ghidra.☆25Oct 9, 2025Updated 5 months ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆38Oct 23, 2018Updated 7 years ago
- Qt Side Channel Analysis Tool to handle signal traces and more☆33Aug 10, 2021Updated 4 years ago
- Basic Block Trace: DynamoRIO client☆29Dec 19, 2021Updated 4 years ago