Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.
☆22Oct 20, 2019Updated 6 years ago
Alternatives and similar repositories for r2con2019-ctf-kernel
Users that are interested in r2con2019-ctf-kernel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My CTF writeups☆27Jul 22, 2021Updated 4 years ago
- My notes about Genyatyk VM crackme☆27Jun 27, 2020Updated 5 years ago
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Sep 28, 2021Updated 4 years ago
- Stuff related with piracy☆10Oct 7, 2020Updated 5 years ago
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Investigating the bug behind CVE-2021-26708☆28Feb 16, 2021Updated 5 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Jun 15, 2018Updated 7 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- RWX CTF Team Writeups☆10Dec 24, 2019Updated 6 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆75May 21, 2021Updated 4 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- A PCode Emulator for Ghidra.☆113Feb 7, 2021Updated 5 years ago
- Crackme challenge☆17Nov 20, 2020Updated 5 years ago
- Challenges and vulnerabilities exploitation.☆60Dec 26, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- GlibC Malloc for Exploiters presentation☆152Jun 22, 2019Updated 6 years ago
- ☆19Apr 30, 2018Updated 7 years ago
- 日前我发现了D-Link DIR 880L/865L/868L/860L路由器存在多个XSS和命令注入漏洞,最主要的问题是路由器未对用户输入进行检查,导致恶意数据请求被执行,最终被远程攻击者控制整个设备。☆11Mar 2, 2018Updated 8 years ago
- ☆13Dec 29, 2022Updated 3 years ago
- QuickPatch: A patching tool☆13Oct 20, 2019Updated 6 years ago
- ☆37Jun 7, 2019Updated 6 years ago
- ☆26Feb 24, 2022Updated 4 years ago
- ☆36Oct 25, 2021Updated 4 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆305Jan 2, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A reimplementation of GNU readelf, using Ryan O'Neill's innovative library, libelfmaster.☆10Sep 28, 2019Updated 6 years ago
- Course sample for SMT-Based Binary Program Analysis training class☆32Apr 19, 2018Updated 7 years ago
- Tasteless CTF 2019☆20Nov 6, 2019Updated 6 years ago
- ☆22Dec 1, 2025Updated 4 months ago
- ☆12May 2, 2017Updated 8 years ago
- Sample WinDbg extension☆15Jun 21, 2019Updated 6 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91May 7, 2024Updated last year
- View Linux perf traces in IDA Pro☆15Nov 18, 2019Updated 6 years ago
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A GUI fuzzing application set up to fuzz calc.exe right now☆37Aug 12, 2020Updated 5 years ago
- Collection of images and examples to use with Shoggoth.☆19Aug 24, 2020Updated 5 years ago
- The radare2 + frida book for Mobile Application assessment☆40Jan 11, 2019Updated 7 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- My scripts for Ghidra.☆25Oct 9, 2025Updated 6 months ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆38Oct 23, 2018Updated 7 years ago
- CPU Adventure 2 challenge from the Dragon CTF 2019☆16May 22, 2025Updated 10 months ago