nobodyisnobody / docsLinks
various docs (that are interesting, or not, depending on the point of view...)
☆119Updated last year
Alternatives and similar repositories for docs
Users that are interested in docs are comparing it to the libraries listed below
Sorting:
- A tool for automating setup of kernel pwn challenges☆61Updated last month
- Collection of browser challenges☆137Updated 4 years ago
- ☆45Updated last year
- All Files, Scripts, and exploits can be found here☆66Updated 4 years ago
- A bunch of V8 resources (with a security focus)☆49Updated 3 weeks ago
- Write-ups for various CTF☆192Updated last year
- ☆232Updated this week
- Easily debug processes running in docker containers☆22Updated last year
- a new class of file structure attacks☆54Updated 2 years ago
- ☆101Updated last year
- GEF - GDB Enhanced Features for exploit devs & reversers☆516Updated this week
- Linux & Android Kernel Vulnerability research and exploitation☆51Updated last year
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆21Updated 3 years ago
- ☆182Updated 5 months ago
- FSOP Again☆24Updated 3 years ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆226Updated 7 months ago
- ☆13Updated last month
- ☆124Updated 2 years ago
- small cute utils for kernel challenges☆37Updated last year
- Windows Pwnable Study☆370Updated last month
- A GDB+GEF-style debugger for unloading Python pickles☆67Updated 3 weeks ago
- Collection of pwn techniques☆29Updated 3 years ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆84Updated 8 months ago
- Python library for CTFer☆146Updated last week
- ☆165Updated 3 years ago
- msFuzz is a coverage-guided fuzzer for Windows kernel drivers that utilizes Intel PT and leverages constraint and dependency analysis to …☆188Updated 2 months ago
- PAWNYABLE!☆211Updated last year
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆27Updated 3 years ago
- Kernel development & exploitation practice environment.☆233Updated last year
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆43Updated 3 years ago