itskarudo / kpwn
🚩 Library to help with kernel pwn (WIP)
☆15Updated 2 months ago
Alternatives and similar repositories for kpwn
Users that are interested in kpwn are comparing it to the libraries listed below
Sorting:
- a new class of file structure attacks☆50Updated 2 years ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆77Updated 5 months ago
- A tool for automating setup of kernel pwn challenges☆55Updated 5 months ago
- various docs (that are interesting, or not, depending on the point of view...)☆113Updated last year
- My personnal repository☆10Updated last year
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆21Updated 2 years ago
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆60Updated last month
- FSOP Again☆22Updated 3 years ago
- ☆18Updated last year
- Write dynamic binary analysis tools in Python☆115Updated 2 months ago
- Rust symbol recovery tool☆49Updated last month
- CTF pwn problem writeup☆39Updated 2 years ago
- Repo for talk slides & materials☆18Updated 5 months ago
- An intuitive query API for IDA Pro☆156Updated last month
- Linux & Android Kernel Vulnerability research and exploitation☆40Updated last year
- small cute utils for kernel challenges☆36Updated last year
- A GDB+GEF-style debugger for unloading Python pickles☆65Updated 4 months ago
- ☆17Updated 2 years ago
- Easily debug processes running in docker containers☆22Updated 10 months ago
- auto-ropper☆17Updated 2 years ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆58Updated 6 months ago
- ☆12Updated 9 months ago
- Exploit for Real World CTF 6th RIPTC.☆33Updated last year
- ☆46Updated last year
- Old and new CTFs about Linux kernel exploitation.☆54Updated 3 years ago
- Static binary instrumentation for windows kernel drivers, to use with winafl☆74Updated 3 months ago
- ☆18Updated last month
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆16Updated last year
- Binary exploitation by confusing the unwinder☆61Updated 2 years ago
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆43Updated 2 years ago