CSAW CTF 2015 Linux kernel exploitation challenge
☆37Nov 16, 2015Updated 10 years ago
Alternatives and similar repositories for StringIPC
Users that are interested in StringIPC are comparing it to the libraries listed below
Sorting:
- cve-2014-4323 poc☆24Oct 15, 2015Updated 10 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- Gdb Extension Framework is a bunch of python code around the gdb api.☆50Jun 12, 2021Updated 4 years ago
- PoC code for 32 bit Android OS☆135Dec 15, 2015Updated 10 years ago
- Linux local root exploit for CVE-2014-0038☆199Apr 18, 2014Updated 11 years ago
- ☆50Jun 1, 2017Updated 8 years ago
- ☆28Aug 4, 2022Updated 3 years ago
- CVE-2014-4322 Exploit☆24Jan 24, 2016Updated 10 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆94Nov 16, 2015Updated 10 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- ☆22Dec 31, 2018Updated 7 years ago
- Rebuilds kallsyms statically from a kernel binary☆43Aug 23, 2017Updated 8 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- poc for cve-2017-10661☆11Aug 11, 2017Updated 8 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow☆55Mar 23, 2016Updated 9 years ago
- OS X tool for dumping IOKit hierarchies in DOT format.☆46Feb 7, 2016Updated 10 years ago
- ☆27May 5, 2016Updated 9 years ago
- Using CVE-2013-6282 to bypass Samsung kernel module authentication☆13Dec 21, 2013Updated 12 years ago
- various exploits☆32Jul 7, 2012Updated 13 years ago
- GDB Python scripts targetting Fennec development☆22Jan 19, 2018Updated 8 years ago
- ☆140Jul 17, 2017Updated 8 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- ctfwriteup☆25Mar 27, 2019Updated 6 years ago
- CVE-2015-1805 root tool☆13Oct 26, 2019Updated 6 years ago
- A tool to generate DLL wrappers☆34Jun 27, 2013Updated 12 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- An Android port of the general purpose honggfuzz fuzzer☆19Aug 20, 2015Updated 10 years ago
- Build a search engine from nmap XML files☆20Aug 19, 2014Updated 11 years ago
- reproduce the experiment in the report.☆28Jan 18, 2015Updated 11 years ago