smallkirby / lysitheaLinks
small cute utils for kernel challenges
☆39Updated last year
Alternatives and similar repositories for lysithea
Users that are interested in lysithea are comparing it to the libraries listed below
Sorting:
- PAWNYABLE!☆231Updated last year
- a new class of file structure attacks☆57Updated 3 years ago
- Python library for CTFer☆172Updated 2 weeks ago
- A bunch of v8 resources (with a security focus)☆86Updated this week
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆101Updated last month
- my writeups (mainly pwnable)☆35Updated last year
- A tool for automating setup of kernel pwn challenges☆60Updated 2 months ago
- ☆189Updated 11 months ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆196Updated last year
- Old and new CTFs about Linux kernel exploitation.☆63Updated 3 years ago
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆50Updated 3 years ago
- CTF pwn problem writeup☆40Updated 2 years ago
- various docs (that are interesting, or not, depending on the point of view...)☆135Updated 2 years ago
- Assets used in lecture "手を動かして理解するLinux Kernel Exploit" at SecurityCamp2023.☆17Updated 2 years ago
- ☆19Updated 2 years ago
- angr tutorial for ctf☆163Updated 4 years ago
- Collection of browser challenges☆138Updated 4 years ago
- ☆100Updated 3 weeks ago
- ☆170Updated last year
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆68Updated last month
- Linux kernel privilege escalation techniques☆151Updated last year
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆92Updated 3 years ago
- FSOP Again☆31Updated 3 years ago
- Kernel development & exploitation practice environment.☆244Updated 2 years ago
- Kernel exploits and writeups☆17Updated 3 years ago
- Simple script to find kernel objects of a certain size in the Linux kernel☆112Updated 3 years ago
- ☆45Updated 4 months ago
- Linux & Android Kernel Vulnerability research and exploitation☆56Updated 2 years ago
- ☆72Updated last year
- Source code for the DEF CON 32 CTF Qualifiers.☆76Updated last year