r4j0x00 / ctf-challengesLinks
CTF challenges that I created
☆18Updated 3 years ago
Alternatives and similar repositories for ctf-challenges
Users that are interested in ctf-challenges are comparing it to the libraries listed below
Sorting:
- ☆48Updated 3 years ago
- Tools for Linux kernel debugging on Bochs (including symbols, native Bochs debugger and IDA PRO)☆31Updated last year
- harness for fuzzing with winafl. both public and my own which i have released.☆57Updated 4 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago
- Binary exploitation by confusing the unwinder☆63Updated 2 years ago
- Investigating the bug behind CVE-2021-26708☆27Updated 4 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆41Updated 3 years ago
- ☆100Updated 3 years ago
- Simple script to find kernel objects of a certain size in the Linux kernel☆109Updated 2 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆33Updated 4 years ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆51Updated 2 years ago
- Uncovering Container Confusion in the Linux Kernel☆44Updated last year
- Old and new CTFs about Linux kernel exploitation.☆55Updated 3 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆51Updated last year
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago
- ☆82Updated 2 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 3 years ago
- Ghidra analyzer for UEFI firmware.☆18Updated 2 years ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Updated 5 years ago
- A library for patching ELFs☆57Updated 4 years ago
- ☆60Updated last year
- Some exploits I have written to showcase and to share☆53Updated 4 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- Linux Kernel N-day Exploit/Analysis.☆65Updated 8 months ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- ☆37Updated last year
- ☆130Updated 2 months ago
- r2con 2020 CTF kernel challenge☆12Updated 4 years ago
- ☆63Updated last year