Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.
☆22Oct 20, 2019Updated 6 years ago
Alternatives and similar repositories for r2con2019-ctf-kernel
Users that are interested in r2con2019-ctf-kernel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My CTF writeups☆27Jul 22, 2021Updated 4 years ago
- My notes about Genyatyk VM crackme☆27Jun 27, 2020Updated 5 years ago
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Sep 28, 2021Updated 4 years ago
- Stuff related with piracy☆10Oct 7, 2020Updated 5 years ago
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Investigating the bug behind CVE-2021-26708☆28Feb 16, 2021Updated 5 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Jun 15, 2018Updated 7 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- RWX CTF Team Writeups☆10Dec 24, 2019Updated 6 years ago
- American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries☆75May 21, 2021Updated 4 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- A PCode Emulator for Ghidra.☆114Feb 7, 2021Updated 5 years ago
- Crackme challenge☆17Nov 20, 2020Updated 5 years ago
- Challenges and vulnerabilities exploitation.☆60Dec 26, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆19Apr 30, 2018Updated 8 years ago
- 日前我发现了D-Link DIR 880L/865L/868L/860L路由器存在多个XSS和命令注入漏洞,最主要的问题是路由器未对用户输入进行检查,导致恶意数据请求被执行,最终被远程攻击者控制整个设备。☆11Mar 2, 2018Updated 8 years ago
- ☆13Dec 29, 2022Updated 3 years ago
- QuickPatch: A patching tool☆13Oct 20, 2019Updated 6 years ago
- ☆37Jun 7, 2019Updated 6 years ago
- ☆26Feb 24, 2022Updated 4 years ago
- ☆37Oct 25, 2021Updated 4 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆305Jan 2, 2023Updated 3 years ago
- A reimplementation of GNU readelf, using Ryan O'Neill's innovative library, libelfmaster.☆10Sep 28, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Course sample for SMT-Based Binary Program Analysis training class☆32Apr 19, 2018Updated 8 years ago
- ☆35Dec 2, 2018Updated 7 years ago
- Tasteless CTF 2019☆20Nov 6, 2019Updated 6 years ago
- ☆22Dec 1, 2025Updated 5 months ago
- ☆12May 2, 2017Updated 9 years ago
- Sample WinDbg extension☆15Jun 21, 2019Updated 6 years ago
- Plot with text in Common Lisp☆14Apr 23, 2026Updated last week
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆90May 7, 2024Updated last year
- View Linux perf traces in IDA Pro☆15Nov 18, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 6 months ago
- Collection of images and examples to use with Shoggoth.☆19Aug 24, 2020Updated 5 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- The radare2 + frida book for Mobile Application assessment☆40Jan 11, 2019Updated 7 years ago
- My scripts for Ghidra.☆26Oct 9, 2025Updated 6 months ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆38Oct 23, 2018Updated 7 years ago
- CPU Adventure 2 challenge from the Dragon CTF 2019☆16May 22, 2025Updated 11 months ago