ctf kernel pwn
☆16Mar 21, 2024Updated last year
Alternatives and similar repositories for Kernel-Pwn
Users that are interested in Kernel-Pwn are comparing it to the libraries listed below
Sorting:
- ☆20Feb 24, 2026Updated last week
- HITCON 2024 x DEVCORE Wargame☆31Aug 30, 2024Updated last year
- Archive for acez.re blog.☆20Apr 17, 2023Updated 2 years ago
- A kernel rootkit that works without kallsyms and kprobe support.☆29Aug 18, 2025Updated 6 months ago
- Pwn CTF writeups including challenges and solutions☆18Dec 21, 2020Updated 5 years ago
- ☆23Jul 18, 2023Updated 2 years ago
- justCTF 2023 challenges sources☆20Jun 26, 2023Updated 2 years ago
- Nelson Lai's social media links☆23Dec 30, 2025Updated 2 months ago
- 一個測試CVE-2024-4577和CVE-2024-8926的安全滲透工具☆40Mar 29, 2025Updated 11 months ago
- Zyxel 防火墙远程命令注入漏洞(CVE-2022-30525)批量检测脚本☆33May 13, 2022Updated 3 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- A centralized Python botnet that currently supports HTTP, TCP and UDP flood attacks.☆14Jul 6, 2025Updated 8 months ago
- A Windows and Office KMS Enabler.☆12Oct 13, 2025Updated 4 months ago
- Proofs-Of-360Security Sandbox Escape☆10Mar 18, 2022Updated 3 years ago
- This was made with the intention of providing evidence of work done towards furthering education in cyber security.☆10May 12, 2022Updated 3 years ago
- ☆12Mar 10, 2024Updated last year
- Challenge handouts, source code, and solutions for UofTCTF 2026☆37Jan 13, 2026Updated last month
- Sophos Central PowerShell module☆11Jul 11, 2023Updated 2 years ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆10Oct 27, 2024Updated last year
- My CTF Challenge☆11Feb 5, 2026Updated last month
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- Exploit for uTorrent vulnerability CVE-2020-8437 by mavlevin☆11Feb 1, 2026Updated last month
- This is a library for stealing browser passwords, crypto stuff, password manager extension stuff, and just general applications too☆11May 10, 2024Updated last year
- Radius Server for multifactor authentication (OTP and PUSH). Linux version.☆12Feb 20, 2026Updated 2 weeks ago
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆10Nov 6, 2022Updated 3 years ago
- An app that helps you and your team find meeting times.☆19Feb 24, 2026Updated last week
- CA Issuers Monitor (Authority Info Access)☆13Mar 8, 2023Updated 2 years ago
- A python RCE exploit on QNAP-QTS☆14Sep 15, 2020Updated 5 years ago
- 记录一下Windows下的Hook技巧☆15Jul 15, 2024Updated last year
- Modern, fast and easy-to-use file manager for Xfce☆14Jul 26, 2012Updated 13 years ago
- ☆13Jun 30, 2017Updated 8 years ago
- A cli-based, multi-architecture gadget-finding tool, designed for fast operation, even with large binaries like browser engines and OS ke…☆17May 1, 2024Updated last year
- ☆11Aug 10, 2021Updated 4 years ago
- PEDA - Python Exploit Development Assistance for GDB☆13Jul 13, 2024Updated last year
- Get email notifications about Twitter unfollowers☆14Mar 23, 2017Updated 8 years ago
- A voxel sandbox game with procedurally generated open world, utilizing a multi-threaded chunk mesh renderer which supports AO and shadow …☆14Jun 7, 2024Updated last year