gsingh93 / linux-exploit-dev-env
Everything you need to build and run Linux and Android kernels for exploit development
☆57Updated 11 months ago
Alternatives and similar repositories for linux-exploit-dev-env:
Users that are interested in linux-exploit-dev-env are comparing it to the libraries listed below
- ☆41Updated 11 months ago
- ☆116Updated last year
- Exynos Modem / Shannon baseband firmware loader for IDA Pro 8.x/9.x☆68Updated 2 months ago
- USB device fuzzing on Android Phone☆31Updated 3 years ago
- Linux & Android Kernel Vulnerability research and exploitation☆37Updated last year
- Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215☆60Updated 2 years ago
- A patched QEMU that exposes an interface for LibAFL-based fuzzers☆72Updated this week
- ☆27Updated last year
- ☆28Updated last year
- Old and new CTFs about Linux kernel exploitation.☆53Updated 2 years ago
- ☆113Updated 6 months ago
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆55Updated 11 months ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆122Updated last year
- ☆56Updated 4 years ago
- ☆63Updated 6 months ago
- ☆55Updated 2 months ago
- Slides from Off-By-One Conferences☆24Updated 6 months ago
- ☆32Updated 3 years ago
- Research related☆89Updated 2 years ago
- Code snippets for Binary Ninja's Python API☆26Updated 3 years ago
- A hacky tool for analysing linux kernel commits☆36Updated 2 years ago
- AFL bindings for Unicorn-Engine☆74Updated this week
- GDB plug-in that helps exploiting the Linux kernel's SLUB allocator☆84Updated last year
- ☆89Updated 2 years ago
- Samples of Shannon baseband firmware for research purposes.☆40Updated 3 years ago
- ☆32Updated 4 years ago
- E²VA short for Exploitation Experience with Vulnerable App is a vulnerable app to learn userspace exploitation on Android☆14Updated last year
- Target components for kAFL/Nyx Fuzzer☆27Updated last week
- IDA script for parsing kallsyms☆75Updated last year
- a new class of file structure attacks☆48Updated 2 years ago