one2blame / heaplab
Notes and challenges from the HeapLAB course taught by Max Kamper.
☆16Updated 3 years ago
Related projects: ⓘ
- Linux & Android Kernel Vulnerability research and exploitation☆26Updated 9 months ago
- Writeups for CTFs☆57Updated this week
- Old and new CTFs about Linux kernel exploitation.☆49Updated 2 years ago
- Targeting Windows Kernel Driver Fuzzer☆119Updated 3 weeks ago
- The best vulnerable driver to learn how to exploit kernel vulnerability.☆28Updated 4 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆87Updated 2 years ago
- Exploit for Real World CTF 6th RIPTC.☆32Updated 7 months ago
- qemu vulnerablity.☆50Updated 3 years ago
- A collection of my weggli patterns to facilitate vulnerability research.☆84Updated 8 months ago
- ☆65Updated this week
- ☆70Updated last year
- a new class of file structure attacks☆45Updated last year
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆53Updated 2 months ago
- Blogpost about optimizing binary-only fuzzing with AFL++☆61Updated 11 months ago
- Use-After-Free in Netfilter nf_tables when processing batch requests CVE-2023-32233☆51Updated last year
- ☆102Updated 3 weeks ago
- CTF pwn problem writeup☆33Updated last year
- Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn☆176Updated 3 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆68Updated 2 years ago
- Collection of browser challenges☆121Updated 3 years ago
- IDA SIG files for multiarch uClibc library☆37Updated 6 years ago
- Linux kernel privilege escalation techniques☆103Updated last month
- ☆113Updated 5 months ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆58Updated last month
- A collection of curated resources and CVEs I use for research.☆99Updated 3 years ago
- ☆114Updated this week
- A collection of browser exploitation codes from Singular Security Lab.☆177Updated last year
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆37Updated 2 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆119Updated 2 years ago
- harness for fuzzing with winafl. both public and my own which i have released.☆51Updated 3 years ago