☆103Dec 17, 2025Updated 4 months ago
Alternatives and similar repositories for linux-kernel-exploitation
Users that are interested in linux-kernel-exploitation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- attachment and write up for D^3CTF 2023's pwn challenge - d3kcache☆42Jun 28, 2024Updated last year
- Linux kernel and browser exploit scripts for ctf challenges☆15Apr 24, 2025Updated last year
- public archive for corCTF 2023☆18Aug 6, 2023Updated 2 years ago
- eastXueLian's reservoir of CTF puzzles.☆16Nov 27, 2024Updated last year
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 6 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆108Jan 13, 2026Updated 3 months ago
- Exploit scripts for ctf challenges that involves linux kernel pwning☆17Dec 10, 2024Updated last year
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Jul 2, 2025Updated 9 months ago
- kernel-pwn and writeup collection☆713Oct 2, 2023Updated 2 years ago
- ☆16Apr 12, 2023Updated 3 years ago
- GEF - GDB Enhanced Features - bata24's fork☆644Updated this week
- Linux kernel exploitation experiments☆406Updated this week
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆85Jul 9, 2025Updated 9 months ago
- Proof-of-Concept of exploits that may be published☆23Oct 24, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- pwndbg configuration to use tmux panes☆14Jan 15, 2025Updated last year
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆95Nov 16, 2015Updated 10 years ago
- Old and new CTFs about Linux kernel exploitation.☆63Mar 28, 2022Updated 4 years ago
- A tool combining DWARF info and source to search for kernel heap objects☆25Dec 23, 2025Updated 4 months ago
- ☆281Aug 2, 2025Updated 8 months ago
- ☆21Dec 24, 2022Updated 3 years ago
- CVE-2025-21479 proof-of-concept, I think☆237Aug 16, 2025Updated 8 months ago
- PAWNYABLE!☆236May 30, 2024Updated last year
- ☆125Aug 3, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- ☆40Jul 25, 2025Updated 9 months ago
- jqctf2023☆16Dec 3, 2023Updated 2 years ago
- Everything you need to build and run Linux and Android kernels for exploit development☆102Apr 9, 2024Updated 2 years ago
- ☆191Feb 8, 2025Updated last year
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆244Dec 23, 2024Updated last year
- Damn Vulenerable Kernel Module for kernel fuzzing☆69Oct 24, 2024Updated last year
- Linux kernel branches for confidential compute research☆20Apr 6, 2026Updated 3 weeks ago
- LibAFLGo: Evaluating and Advancing Directed Greybox Fuzzing☆25Mar 4, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,289Jan 29, 2026Updated 3 months ago
- Android kernel exploitation for CVE-2022-20409☆210Oct 17, 2024Updated last year
- Linux kernel privilege escalation techniques☆154Aug 9, 2024Updated last year
- A bunch of V8 resources (with a security focus)☆119Updated this week
- Computer Security Fall 2019 by Hsu-Chun Hsiao @ CSIE NTU Taiwan☆23Mar 20, 2021Updated 5 years ago
- Exploit for Real World CTF 6th RIPTC.☆33Jan 31, 2024Updated 2 years ago
- 计算自身md5的最小ELF64程序.The minimum ELF64 program to calculate its own md5☆11Apr 20, 2020Updated 6 years ago