esanfelix / r2con2020-ctf-kernelView external linksLinks
r2con 2020 CTF kernel challenge
☆12Sep 13, 2020Updated 5 years ago
Alternatives and similar repositories for r2con2020-ctf-kernel
Users that are interested in r2con2020-ctf-kernel are comparing it to the libraries listed below
Sorting:
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Jun 26, 2018Updated 7 years ago
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 7 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- ☆14Jun 25, 2019Updated 6 years ago
- IDA loader for Apple SecureROM☆13Sep 29, 2019Updated 6 years ago
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆11Mar 8, 2022Updated 3 years ago
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- Cyber Jawara 2020 Final - Jeopardy CTF problemset☆33Jul 22, 2022Updated 3 years ago
- Android app for demonstrating native library harnessing☆42Dec 4, 2018Updated 7 years ago
- keynote I gave at GreHack 2019☆19Nov 17, 2019Updated 6 years ago
- HackToday is annual ctf competition held by Cyber Security IPB☆17Mar 19, 2021Updated 4 years ago
- Learning Go Code by Example.☆23Mar 3, 2024Updated last year
- gopclntab finder and analyzer for Radare2☆21Aug 15, 2020Updated 5 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- Polymorphic ELF Runtime Crypter written in rust.☆21Jan 21, 2021Updated 5 years ago
- My AddressSanitizer implementation in C☆29Jan 29, 2021Updated 5 years ago
- Lab To Pratice Web Hacking☆26Jun 14, 2019Updated 6 years ago
- CTF Writeups☆26Oct 6, 2019Updated 6 years ago
- OpenVPN Connect for Windows (MSI) - 3.1.0.361 - Privilege Escalation☆26Feb 28, 2020Updated 5 years ago
- A PyQt5 frontend to the binjatron plugin for Binary Ninja that includes highlighting features aimed at making it easier for beginners to …☆25Aug 22, 2017Updated 8 years ago
- ☆21Dec 23, 2019Updated 6 years ago
- My notes about Genyatyk VM crackme☆26Jun 27, 2020Updated 5 years ago
- My CTF writeups☆27Jul 22, 2021Updated 4 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Jun 15, 2018Updated 7 years ago
- ROP Wargame repository☆27Sep 11, 2017Updated 8 years ago
- Exploit Development: Case Studies 🔮☆25Jun 10, 2018Updated 7 years ago
- experimentation/code from Tanguy Dubroca (summer 2019)☆28Aug 10, 2019Updated 6 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Jun 26, 2020Updated 5 years ago
- Additional resources and references for linux-exploit-suggester.sh☆30Oct 2, 2020Updated 5 years ago
- ☆30Dec 26, 2021Updated 4 years ago
- The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses.☆34Jan 22, 2021Updated 5 years ago
- CVE-2020–14882 by Jang☆29Oct 29, 2020Updated 5 years ago
- ☆35Dec 2, 2018Updated 7 years ago
- Linux Kernel exploitation Tutorial.☆276Jun 30, 2020Updated 5 years ago
- A Binary Ninja plugin for importing IDC database dumps from IDA.☆40Oct 13, 2022Updated 3 years ago
- Reexport symbols for Mach-O and ELF☆38Mar 2, 2018Updated 7 years ago
- repository for kernel exploit practice☆415Nov 12, 2019Updated 6 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- A python toolkit that I created to help me solve cryptography CTF challenges.☆10Jun 24, 2022Updated 3 years ago