CSAW CTF 2015 Linux kernel exploitation challenge
☆38Nov 16, 2015Updated 10 years ago
Alternatives and similar repositories for StringIPC
Users that are interested in StringIPC are comparing it to the libraries listed below
Sorting:
- cve-2014-4323 poc☆24Oct 15, 2015Updated 10 years ago
- Linux local root exploit for CVE-2014-0038☆199Apr 18, 2014Updated 11 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆94Nov 16, 2015Updated 10 years ago
- PoC code for 32 bit Android OS☆135Dec 15, 2015Updated 10 years ago
- CVE-2014-4322 Exploit☆24Jan 24, 2016Updated 10 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- poc for cve-2017-10661☆11Aug 11, 2017Updated 8 years ago
- ☆50Jun 1, 2017Updated 8 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Dec 21, 2013Updated 12 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- ☆22Dec 31, 2018Updated 7 years ago
- Rebuilds kallsyms statically from a kernel binary☆43Aug 23, 2017Updated 8 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- ctfwriteup☆25Mar 27, 2019Updated 6 years ago
- Gdb Extension Framework is a bunch of python code around the gdb api.☆50Jun 12, 2021Updated 4 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- A simple linux rootkit project for COMP9447: Security Workshop☆20Jun 24, 2013Updated 12 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- Advent Calendar CTF 2014☆10Nov 4, 2015Updated 10 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- slide and full exploit☆87Oct 1, 2020Updated 5 years ago
- ☆32Nov 15, 2017Updated 8 years ago
- blog☆17Apr 27, 2020Updated 5 years ago
- Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow☆55Mar 23, 2016Updated 9 years ago
- ☆27May 5, 2016Updated 9 years ago
- ☆140Jul 17, 2017Updated 8 years ago
- ☆20Mar 6, 2015Updated 11 years ago
- GDB Python scripts targetting Fennec development☆22Jan 19, 2018Updated 8 years ago
- QSEE Shellcode to directly hijack the "Normal World" Linux Kernel☆55May 5, 2016Updated 9 years ago
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Aug 12, 2023Updated 2 years ago
- OS X tool for dumping IOKit hierarchies in DOT format.☆46Feb 7, 2016Updated 10 years ago
- Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference☆52Apr 7, 2016Updated 9 years ago
- CVE-2015-1805 root tool☆13Oct 26, 2019Updated 6 years ago
- Library for structured fuzzing of ASN.1 DER/BER☆19Sep 6, 2022Updated 3 years ago
- 研究成果/论文公开☆15Mar 6, 2019Updated 7 years ago