☆103Dec 17, 2025Updated 3 months ago
Alternatives and similar repositories for linux-kernel-exploitation
Users that are interested in linux-kernel-exploitation are comparing it to the libraries listed below
Sorting:
- attachment and write up for D^3CTF 2023's pwn challenge - d3kcache☆42Jun 28, 2024Updated last year
- Linux kernel and browser exploit scripts for ctf challenges☆15Apr 24, 2025Updated 10 months ago
- public archive for corCTF 2023☆18Aug 6, 2023Updated 2 years ago
- eastXueLian's reservoir of CTF puzzles.☆15Nov 27, 2024Updated last year
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 4 months ago
- Exploit scripts for ctf challenges that involves linux kernel pwning☆17Dec 10, 2024Updated last year
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆107Jan 13, 2026Updated 2 months ago
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Jul 2, 2025Updated 8 months ago
- kernel-pwn and writeup collection☆705Oct 2, 2023Updated 2 years ago
- ☆16Apr 12, 2023Updated 2 years ago
- GEF - GDB Enhanced Features - bata24's fork☆629Updated this week
- Linux kernel exploitation experiments☆389Jan 19, 2026Updated 2 months ago
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆86Jul 9, 2025Updated 8 months ago
- Proof-of-Concept of exploits that may be published☆23Oct 24, 2024Updated last year
- pwndbg configuration to use tmux panes☆14Jan 15, 2025Updated last year
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆94Nov 16, 2015Updated 10 years ago
- Old and new CTFs about Linux kernel exploitation.☆64Mar 28, 2022Updated 3 years ago
- A tool combining DWARF info and source to search for kernel heap objects☆25Dec 23, 2025Updated 2 months ago
- ☆273Aug 2, 2025Updated 7 months ago
- ☆21Dec 24, 2022Updated 3 years ago
- CVE-2025-21479 proof-of-concept, I think☆225Aug 16, 2025Updated 7 months ago
- PAWNYABLE!☆235May 30, 2024Updated last year
- ☆126Aug 3, 2024Updated last year
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- ☆39Jul 25, 2025Updated 7 months ago
- jqctf2023☆16Dec 3, 2023Updated 2 years ago
- A full-featured Matrix music bot for Element Call with Discord-style chat commands.☆24Mar 3, 2026Updated 2 weeks ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆243Dec 23, 2024Updated last year
- ☆189Feb 8, 2025Updated last year
- A bunch of V8 resources (with a security focus)☆108Updated this week
- Android kernel exploitation for CVE-2022-20409☆205Oct 17, 2024Updated last year
- Linux kernel privilege escalation techniques☆153Aug 9, 2024Updated last year
- Computer Security Fall 2019 by Hsu-Chun Hsiao @ CSIE NTU Taiwan☆23Mar 20, 2021Updated 5 years ago
- Exploit for Real World CTF 6th RIPTC.☆33Jan 31, 2024Updated 2 years ago
- 计算自身md5的最小ELF64程序.The minimum ELF64 program to calculate its own md5☆11Apr 20, 2020Updated 5 years ago
- Exploit for CVE-2025-21756 for Linux kernel 6.6.75. My first linux kernel exploit!☆157Jun 5, 2025Updated 9 months ago
- PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Iv…☆50Jan 16, 2025Updated last year
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,285Jan 29, 2026Updated last month
- This lab guides you through setting up an environment to explore CVE-2019-2215, a critical Android kernel vulnerability in the binder sub…☆40Apr 24, 2025Updated 10 months ago