repository for kernel exploit practice
☆417Nov 12, 2019Updated 6 years ago
Alternatives and similar repositories for kernel-exploit-practice
Users that are interested in kernel-exploit-practice are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- kernel-pwn and writeup collection☆712Oct 2, 2023Updated 2 years ago
- An updated collection of resources targeting browser-exploitation.☆833Mar 8, 2021Updated 5 years ago
- Some pwn challenges selected for training and education.☆389Jun 26, 2023Updated 2 years ago
- ☆228Dec 9, 2020Updated 5 years ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆524Jun 28, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A collection of links related to VMware escape exploits☆1,492Sep 4, 2024Updated last year
- ☆286Apr 23, 2020Updated 6 years ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆923May 20, 2024Updated last year
- share some useful archives about vm and qemu escape exploit.☆588Mar 18, 2026Updated last month
- GEF - GDB Enhanced Features - bata24's fork☆643Apr 20, 2026Updated last week
- Collection of scripts and writeups☆321Dec 14, 2021Updated 4 years ago
- A collection of links related to Linux kernel security and exploitation☆6,419Mar 7, 2026Updated last month
- ☆52Nov 22, 2021Updated 4 years ago
- HITCON CTF 2018☆46Oct 22, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Android Kernel Exploitation☆646Feb 13, 2022Updated 4 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆224Sep 16, 2020Updated 5 years ago
- My Chrome and Safari exploit code + write-up repo☆533Nov 5, 2021Updated 4 years ago
- Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities☆414Mar 19, 2021Updated 5 years ago
- awesome list of browser exploitation tutorials☆2,278Sep 18, 2023Updated 2 years ago
- Learn how to combine libprotobuf-mutator with libfuzzer & AFL++☆258Sep 24, 2024Updated last year
- Windows Pwnable Study☆418Jun 16, 2025Updated 10 months ago
- Chrome V8 exploit guide for starter from build to exploit in Korean. If This has incorrect information, Please let me know, Chrome V8 Ex…☆165Apr 13, 2019Updated 7 years ago
- PAWNYABLE!☆236May 30, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Linux kernel module implementation & exploitation (pwn) labs.☆212Jan 26, 2022Updated 4 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆863Jun 4, 2020Updated 5 years ago
- ☆176May 2, 2019Updated 6 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆201Mar 14, 2024Updated 2 years ago
- Kernel development & exploitation practice environment.☆252Sep 10, 2023Updated 2 years ago
- ☆191Feb 8, 2025Updated last year
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆763Jan 27, 2026Updated 3 months ago
- A tool for inferring the Linux kernel base address and physical memory layout as an unprivileged local user, for the purpose of bypassing…☆480Apr 22, 2026Updated last week
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆449Apr 11, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Linux Kernel exploitation Tutorial.☆275Jun 30, 2020Updated 5 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆305Jan 2, 2023Updated 3 years ago
- A repository for learning various heap exploitation techniques.☆8,606Updated this week
- Linux Heap Exploitation Practice☆394Dec 1, 2018Updated 7 years ago
- Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn☆187Dec 25, 2020Updated 5 years ago
- The best tool for finding one gadget RCE in libc.so.6☆2,317Apr 21, 2026Updated last week
- Here is some resources about macOS/iOS system security.☆550Feb 19, 2025Updated last year