Helper scripts for hosting a Linux kernel exploitation CTF challenge
☆94Nov 16, 2015Updated 10 years ago
Alternatives and similar repositories for Linux-Kernel-CTF
Users that are interested in Linux-Kernel-CTF are comparing it to the libraries listed below
Sorting:
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆38Nov 16, 2015Updated 10 years ago
- ☆17May 13, 2019Updated 6 years ago
- Exploits for interesting CTF challenges I have worked on☆63Mar 1, 2017Updated 9 years ago
- PoC exploit for CVE-2016-4622☆109Sep 18, 2023Updated 2 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆130Jun 25, 2017Updated 8 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- Repository to train/learn memory corruption on the ARM platform.☆356Apr 17, 2017Updated 8 years ago
- A code gadget finder based on capstone/keystone/pyelftools☆92Mar 9, 2017Updated 9 years ago
- hacklu2014 x86_64 exploitation challenge using DWARF bytecode☆22Oct 23, 2014Updated 11 years ago
- Black Hat 2016 Slides, Paper and Code☆83Aug 10, 2016Updated 9 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- Guides for locking down a computer☆12Mar 4, 2023Updated 3 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Jun 26, 2020Updated 5 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 11 years ago
- ☆567May 30, 2018Updated 7 years ago
- Crappy Win32k syscall fuzzer☆13May 2, 2015Updated 10 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- checksec-ng. Elf checksec in Python. Does large-scale package analysis. Now with multi-core support!☆68Mar 19, 2014Updated 12 years ago
- A tool to add simple inline patches to a binary to rearrange its stack frames, and other things!☆46Jun 11, 2022Updated 3 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 10 years ago
- Smashing The Browser: From Vulnerability Discovery To Exploit☆448Jul 18, 2015Updated 10 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 3 months ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- CTF Challenge Framework for Windows 8 and above☆156Jul 14, 2021Updated 4 years ago
- A CTF VM that fights back☆19Apr 4, 2012Updated 13 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- A simple XSS challenge example using Zombie.js☆10Apr 8, 2015Updated 10 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Source code for building an exploitable linux kernel challenge iso.☆45Oct 1, 2013Updated 12 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- 从0开始写一个操作系统——《操作系统真象还原》☆12Sep 21, 2020Updated 5 years ago
- BrundleFuzz is a distributed fuzzer for Windows and Linux using dynamic binary instrumentation.☆82Sep 10, 2016Updated 9 years ago
- ☆17Oct 5, 2014Updated 11 years ago