h0pe-ay / Kernel-PwnLinks
ctf kernel pwn
☆16Updated last year
Alternatives and similar repositories for Kernel-Pwn
Users that are interested in Kernel-Pwn are comparing it to the libraries listed below
Sorting:
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆232Updated 10 months ago
- basic amd64 alphanumeric shellcode encoder☆194Updated last year
- Templates for deploying pwn challenge in ctf☆46Updated 2 years ago
- Angr CTF From introduction to mastery☆151Updated 4 months ago
- ☆379Updated 3 years ago
- SAEG: Stateful Automatic Exploit Generation, an AEG framework for CGC / RHG and pwnable CTF challenges.☆170Updated 10 months ago
- Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn☆187Updated 4 years ago
- Linux kernel module implementation & exploitation (pwn) labs.☆204Updated 3 years ago
- This is a PWN challenges repo.######## 1f y0u l1ke, g1v3 m3 a star~☆36Updated 4 years ago
- ☆297Updated 3 years ago
- a tools to run qemu automatically for simulate firmware of IoT☆75Updated 3 months ago
- Let's get familiar with Windows pwn 😎☆49Updated 5 years ago
- ☆26Updated 2 years ago
- eastXueLian's reservoir of CTF puzzles.☆13Updated 11 months ago
- Source code for the DEF CON 32 CTF Qualifiers.☆74Updated last year
- FortiGate automatic repack script☆20Updated 2 years ago
- Linux kernel privilege escalation techniques☆146Updated last year
- ☆43Updated 3 years ago
- a GDB plug-in for inspecting mallocng☆58Updated last year
- ☆23Updated last year
- Archive of AAA CTF 2023 (XCTF competition)☆37Updated last year
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆81Updated 3 months ago
- Automatically exported from code.google.com/p/alpha3☆56Updated 5 years ago
- windows debug and exploit toolset for both user and kernel mode☆190Updated 4 months ago
- Source code for the DEF CON 33 CTF Qualifiers.☆52Updated 2 months ago
- attachments and (some) writeups/source code for RWCTF 5th☆57Updated 2 years ago
- ☆69Updated 2 years ago
- ☆119Updated last year
- ☆111Updated 11 months ago
- Automatic Exploit Generation Paper☆90Updated 3 years ago