Add debugging tools to an existing initramfs, even if it is for a foreign architecture
☆24Aug 28, 2024Updated last year
Alternatives and similar repositories for initramfs-wrap
Users that are interested in initramfs-wrap are comparing it to the libraries listed below
Sorting:
- ☆28Aug 26, 2025Updated 6 months ago
- A tool combining DWARF info and source to search for kernel heap objects☆24Dec 23, 2025Updated 2 months ago
- ☆172Jan 5, 2025Updated last year
- Port of the classic first-person-shooter DOOM to Xbox for DEFCON 27 CTF☆26Aug 20, 2019Updated 6 years ago
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Jul 2, 2025Updated 8 months ago
- IDA script for parsing kallsyms☆86Dec 8, 2025Updated 2 months ago
- Services from training sessions of A&D season☆12Jun 1, 2021Updated 4 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago
- ☆30Sep 6, 2022Updated 3 years ago
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 4 months ago
- Slightly better IDA code folding☆14May 26, 2020Updated 5 years ago
- All challenges and writups of the GlacierCTF 2023☆16Feb 15, 2024Updated 2 years ago
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆12Mar 8, 2022Updated 3 years ago
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13May 13, 2019Updated 6 years ago
- Vulnerability Data Tracer - Published at Phrack 67 Article☆15Dec 12, 2014Updated 11 years ago
- Explore a live Linux kernel's memory using GDB☆117Oct 20, 2022Updated 3 years ago
- Hacking the Linux kernel☆15Jun 17, 2023Updated 2 years ago
- My challenges for SECCON CTF 2022 Finals☆18Feb 15, 2023Updated 3 years ago
- Peripheral Transplantation to Rehost Embedded Linux kernels☆16Mar 6, 2022Updated 3 years ago
- IDA plugin to make classes automatically☆20Oct 31, 2024Updated last year
- Automated recovery of Linux kernel build configurations☆25Jan 14, 2022Updated 4 years ago
- Longue vue is an exploit chain that can compromise over the internet NETGEAR DGND3700v2 devices.☆26Mar 15, 2022Updated 3 years ago
- pwntools library implementation in c++☆49Apr 11, 2021Updated 4 years ago
- ☆21Apr 6, 2025Updated 11 months ago
- Large public A&D training on 2018-11-04☆23Jun 1, 2021Updated 4 years ago
- ☆45Sep 7, 2025Updated 5 months ago
- prebuilt binaries for multiple architeture☆202Mar 7, 2023Updated 2 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91May 12, 2022Updated 3 years ago
- Custom exploits☆28Apr 8, 2024Updated last year
- Just a repo for random tools we have developed related to vulnerability research and exploit development.☆24Nov 19, 2020Updated 5 years ago
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆69Nov 13, 2025Updated 3 months ago
- qemu vulnerablity.☆55May 25, 2021Updated 4 years ago
- A library for patching ELFs☆62Dec 4, 2020Updated 5 years ago
- ☆189Feb 8, 2025Updated last year
- Docker image for RISC-V 32/64 development environment, along with Qemu☆25Jul 3, 2022Updated 3 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆35Apr 26, 2022Updated 3 years ago
- A useful IDA Notepad plug-in that can completely replace IDA’s native Notepad window.☆34Dec 3, 2024Updated last year
- ☆38Feb 20, 2023Updated 3 years ago