smallkirby / lysithea
small cute utils for kernel challenges
☆35Updated last year
Alternatives and similar repositories for lysithea:
Users that are interested in lysithea are comparing it to the libraries listed below
- a new class of file structure attacks☆50Updated 2 years ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆76Updated 5 months ago
- PAWNYABLE!☆207Updated 11 months ago
- my writeups (mainly pwnable)☆33Updated 7 months ago
- ☆18Updated last year
- Python library for CTFer☆140Updated 2 weeks ago
- A tool for automating setup of kernel pwn challenges☆55Updated 5 months ago
- CTF pwn problem writeup☆38Updated 2 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆80Updated 2 years ago
- Old and new CTFs about Linux kernel exploitation.☆54Updated 3 years ago
- ☆73Updated last year
- various docs (that are interesting, or not, depending on the point of view...)☆113Updated last year
- ☆175Updated 2 months ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆186Updated last year
- Collection of browser challenges☆130Updated 4 years ago
- ☆29Updated 2 years ago
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆42Updated 2 years ago
- Linux kernel privilege escalation techniques☆135Updated 8 months ago
- ☆46Updated last year
- angr tutorial for ctf☆150Updated 4 years ago
- ☆205Updated last week
- FSOP Again☆22Updated 3 years ago
- Chrome V8 CVE exploits and proof-of-concept scripts written by me, for educational and research purposes only.☆60Updated 8 months ago
- My challenges for SECCON CTF 2022 Finals☆17Updated 2 years ago
- ☆26Updated 3 years ago
- Simple script to find kernel objects of a certain size in the Linux kernel☆109Updated 2 years ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 3 years ago
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆56Updated last year
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆221Updated 4 months ago
- Linux & Android Kernel Vulnerability research and exploitation☆40Updated last year