hardenedlinux / linux-exploit-development-tutorialLinks
a series tutorial for linux exploit development to newbie.
☆559Updated last year
Alternatives and similar repositories for linux-exploit-development-tutorial
Users that are interested in linux-exploit-development-tutorial are comparing it to the libraries listed below
Sorting:
- Repo for FUZE project. I will also publish some Linux kernel LPE exploits for various real world kernel vulnerabilities here. the samples…☆497Updated 6 years ago
- LibZeroEvil & the Research Rootkit project.☆593Updated 3 years ago
- For Linux binary Exploitation☆832Updated 7 years ago
- My proof-of-concept exploits for the Linux kernel☆1,472Updated 3 years ago
- The Damn Vulnerable Router Firmware Project☆691Updated 4 years ago
- ☆472Updated 7 years ago
- python library to examine ptmalloc (the glibc userland heap implementation)☆509Updated 4 years ago
- all mine papers, pwn & exploit☆405Updated 8 years ago
- Linux Heap Exploitation Practice☆383Updated 6 years ago
- The vm images in this repo are lost, we recommend our new project: https://github.com/hust-open-atom-club/S2VulnHub☆330Updated 11 months ago
- A tool to help you write binary exploits☆610Updated 6 years ago
- A colleciton of CTF write-ups all using pwntools☆513Updated 8 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆301Updated 2 years ago
- A set of Linux binary exploitation tasks for beginners on various architectures☆537Updated 3 years ago
- ☆365Updated 4 months ago
- Cross Platform Kernel Fuzzer Framework☆450Updated 6 years ago
- A list of my CVE's with POCs☆674Updated 4 years ago
- Tracking CVEs for the linux Kernel☆748Updated last year
- Some pwn challenges selected for training and education.☆385Updated 2 years ago
- My Chrome and Safari exploit code + write-up repo☆528Updated 3 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆955Updated 4 years ago
- share some useful archives about vm and qemu escape exploit.☆550Updated last year
- gdb for pwn☆927Updated 10 months ago
- Collection of scripts and writeups☆323Updated 3 years ago
- Security CTF Toolkit (Not maintained anymore)☆370Updated 7 years ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆646Updated 2 months ago
- Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)☆936Updated 3 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2018☆270Updated 6 years ago
- Tutorial for writing kernel exploits☆253Updated 7 years ago
- 一步一步学ROP☆561Updated 9 years ago