Helper scripts for hosting a Linux kernel exploitation CTF challenge
☆94Nov 16, 2015Updated 10 years ago
Alternatives and similar repositories for Linux-Kernel-CTF
Users that are interested in Linux-Kernel-CTF are comparing it to the libraries listed below
Sorting:
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- PoC exploit for CVE-2016-4622☆109Sep 18, 2023Updated 2 years ago
- Exploits for interesting CTF challenges I have worked on☆63Mar 1, 2017Updated 9 years ago
- ☆17May 13, 2019Updated 6 years ago
- A code gadget finder based on capstone/keystone/pyelftools☆92Mar 9, 2017Updated 8 years ago
- Repository to train/learn memory corruption on the ARM platform.☆356Apr 17, 2017Updated 8 years ago
- hacklu2014 x86_64 exploitation challenge using DWARF bytecode☆22Oct 23, 2014Updated 11 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆129Jun 25, 2017Updated 8 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆37Nov 16, 2015Updated 10 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- Tools made for Tizen Security Analysis☆14Jun 2, 2015Updated 10 years ago
- Guides for locking down a computer☆12Mar 4, 2023Updated 2 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Jun 26, 2020Updated 5 years ago
- Black Hat 2016 Slides, Paper and Code☆83Aug 10, 2016Updated 9 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 3 months ago
- ☆567May 30, 2018Updated 7 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- ☆30Nov 25, 2025Updated 3 months ago
- A CTF VM that fights back☆19Apr 4, 2012Updated 13 years ago
- CTF writeups☆114Aug 26, 2017Updated 8 years ago
- Tips, Tricks, and Suggestions for Running a CTF☆400Aug 2, 2022Updated 3 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Oct 1, 2013Updated 12 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 10 years ago
- A simple XSS challenge example using Zombie.js☆10Apr 8, 2015Updated 10 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- CTF Challenge Framework for Windows 8 and above☆156Jul 14, 2021Updated 4 years ago
- A light ELF binary patch tool in python urwid☆147Sep 12, 2019Updated 6 years ago
- Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow☆55Mar 23, 2016Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆82Sep 10, 2016Updated 9 years ago
- checksec-ng. Elf checksec in Python. Does large-scale package analysis. Now with multi-core support!☆68Mar 19, 2014Updated 11 years ago
- CVE-2015-3636 exploit☆45Nov 22, 2015Updated 10 years ago
- Full exploit of CVE-2016-6754(BadKernel) and slide of SyScan360 2016☆152Nov 28, 2016Updated 9 years ago
- PFI (Port Forwarding Interceptor)☆46Jan 29, 2026Updated last month