pr0cf5 / kernel-exploit-practice
repository for kernel exploit practice
☆388Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for kernel-exploit-practice
- Linux Heap Exploitation Practice☆377Updated 5 years ago
- Windows Pwnable Study☆323Updated 4 years ago
- Kernel development & exploitation practice environment.☆212Updated last year
- kernel-pwn and writeup collection☆568Updated last year
- This Repository aims at giving a basic idea about Kernel Exploitation.☆501Updated 4 months ago
- Some CTF write up☆240Updated 2 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆182Updated 8 months ago
- Basic pwntools for Windows☆257Updated last year
- Kernel Fuzzer for Xen Project (KF/x) - Hypervisor-based fuzzing using Xen VM forking, VMI & AFL☆467Updated 4 months ago
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆382Updated last year
- Use angr inside GDB. Create an angr state from the current debugger state.☆199Updated 4 years ago
- An updated collection of resources targeting browser-exploitation.☆810Updated 3 years ago
- 🔍Heap analysis tool for CTF pwn.☆221Updated 3 years ago
- Collection of scripts and writeups☆320Updated 2 years ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆393Updated this week
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆220Updated 4 years ago
- Some pwn challenges selected for training and education.☆379Updated last year
- ☆280Updated 4 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆801Updated 4 years ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆420Updated 7 months ago
- ☆612Updated last month
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆390Updated 4 years ago
- ☆107Updated 4 years ago
- Code and exercises for a workshop on z3 and angr☆222Updated 3 years ago
- Using Intel's PIN tool to solve CTF problems☆493Updated 4 years ago
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆187Updated 2 years ago
- ☆222Updated 3 years ago
- ☆163Updated 9 months ago
- angr tutorial for ctf☆142Updated 3 years ago
- Use angr in Ghidra☆562Updated 3 months ago