hardenedlinux / linux-exploit-development-tutorial
a series tutorial for linux exploit development to newbie.
☆555Updated 11 months ago
Alternatives and similar repositories for linux-exploit-development-tutorial:
Users that are interested in linux-exploit-development-tutorial are comparing it to the libraries listed below
- LibZeroEvil & the Research Rootkit project.☆594Updated 3 years ago
- My proof-of-concept exploits for the Linux kernel☆1,464Updated 2 years ago
- Repo for FUZE project. I will also publish some Linux kernel LPE exploits for various real world kernel vulnerabilities here. the samples…☆495Updated 6 years ago
- For Linux binary Exploitation☆829Updated 6 years ago
- ☆467Updated 6 years ago
- The Damn Vulnerable Router Firmware Project☆683Updated 3 years ago
- Linux Heap Exploitation Practice☆378Updated 6 years ago
- python library to examine ptmalloc (the glibc userland heap implementation)☆506Updated 3 years ago
- Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)☆953Updated 4 years ago
- all mine papers, pwn & exploit☆400Updated 7 years ago
- A set of Linux binary exploitation tasks for beginners on various architectures☆529Updated 3 years ago
- A tool to help you write binary exploits☆608Updated 6 years ago
- Various kernel exploits☆771Updated last year
- My Chrome and Safari exploit code + write-up repo☆528Updated 3 years ago
- share some useful archives about vm and qemu escape exploit.☆541Updated 11 months ago
- Cross Platform Kernel Fuzzer Framework☆451Updated 6 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆298Updated 2 years ago
- Tracking CVEs for the linux Kernel☆744Updated 11 months ago
- jemalloc heap exploitation framework☆454Updated 3 years ago
- A colleciton of CTF write-ups all using pwntools☆509Updated 8 years ago
- Security CTF Toolkit (Not maintained anymore)☆368Updated 7 years ago
- A Return-oriented Programming toolkit☆349Updated 7 years ago
- A list of my CVE's with POCs☆673Updated 4 years ago
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,257Updated 2 years ago
- the core papers i researched about kernel security.☆138Updated last year
- ☆359Updated last month
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆670Updated 2 months ago
- Shellphish's automated exploitation engine, originally created for the Cyber Grand Challenge.☆643Updated last month
- ☆556Updated 6 years ago
- Collection of scripts and writeups☆320Updated 3 years ago