A Linux Kernel Exploitation C Library
☆19Oct 29, 2025Updated 4 months ago
Alternatives and similar repositories for libx
Users that are interested in libx are comparing it to the libraries listed below
Sorting:
- ☆21Apr 6, 2025Updated 10 months ago
- This is a ctf challenge for qemu escape, it's basic and normal, but there is a thinking trap in it, you may need some time to find out th…☆10Mar 28, 2024Updated last year
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆106Jan 13, 2026Updated last month
- My CTF Challenge☆11Feb 5, 2026Updated 3 weeks ago
- A general way to Recover Safe linking protected value/pointer☆15Oct 23, 2022Updated 3 years ago
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Jul 2, 2025Updated 7 months ago
- C++ Alt syscall hook in 25h2 can be load by KDU☆22Feb 18, 2026Updated last week
- ☆55Apr 28, 2022Updated 3 years ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆244Dec 23, 2024Updated last year
- ☆23Jan 27, 2026Updated last month
- CTF Writeups Backup☆13Nov 4, 2024Updated last year
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- This is a scanning tools for AIS3 project in group 7☆18Aug 3, 2025Updated 6 months ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13May 13, 2019Updated 6 years ago
- xiaomi lua anti☆33Jul 8, 2020Updated 5 years ago
- My public CTF challenge☆17Aug 25, 2025Updated 6 months ago
- eastXueLian's reservoir of CTF puzzles.☆15Nov 27, 2024Updated last year
- ☆103Dec 17, 2025Updated 2 months ago
- A tool combining DWARF info and source to search for kernel heap objects☆24Dec 23, 2025Updated 2 months ago
- A fast and powerful gadget finder and ROP chain generator. A research prototype for the ropbot paper accepted at NDSS'26.☆43Jan 22, 2026Updated last month
- ReCopilot IDA☆49Jan 12, 2026Updated last month
- Add debugging tools to an existing initramfs, even if it is for a foreign architecture☆24Aug 28, 2024Updated last year
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91May 12, 2022Updated 3 years ago
- ☆56Aug 30, 2022Updated 3 years ago
- All virtualization escape challenges and writeups in RealWorldCTF☆89Jan 14, 2019Updated 7 years ago
- Let's get familiar with Windows pwn 😎☆61Feb 24, 2020Updated 6 years ago
- My browser pwn collections. Mainly JavaScript engine stuff.☆33Jan 27, 2025Updated last year
- A V8 Sandbox Escape Technique.☆33Jul 4, 2024Updated last year
- ☆34Jun 11, 2024Updated last year
- An IDA Pro plugin that display cross-references to functions or variables across the entire binary in Hex-Rays pseudocode☆126Jan 31, 2026Updated last month
- SCTF 2023 kernel pwn && CVE-2023-3640☆29Jul 17, 2023Updated 2 years ago
- Exploit for Real World CTF 6th RIPTC.☆33Jan 31, 2024Updated 2 years ago
- ☆40Apr 23, 2025Updated 10 months ago
- External Hack for Aura Kingdom TO☆14Feb 17, 2023Updated 3 years ago
- IECS213 微處理機系統☆12Dec 12, 2025Updated 2 months ago
- ☆28Aug 26, 2025Updated 6 months ago
- 這份筆記是關於 Angelboy 2022 年在臺灣好厲駭開的 Windows Binary Exploitation 課程,內含個人撰寫的解題腳本、課堂筆記、以及自行設計的課堂練習題和架設腳本☆87Nov 20, 2024Updated last year