smallkirby / lysitheaLinks
small cute utils for kernel challenges
☆39Updated last year
Alternatives and similar repositories for lysithea
Users that are interested in lysithea are comparing it to the libraries listed below
Sorting:
- PAWNYABLE!☆230Updated last year
- a new class of file structure attacks☆57Updated 3 years ago
- A bunch of v8 resources (with a security focus)☆83Updated this week
- A tool for automating setup of kernel pwn challenges☆60Updated last month
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆97Updated last week
- Python library for CTFer☆170Updated last month
- ☆189Updated 10 months ago
- my writeups (mainly pwnable)☆35Updated last year
- ☆19Updated 2 years ago
- Old and new CTFs about Linux kernel exploitation.☆63Updated 3 years ago
- CTF pwn problem writeup☆40Updated 2 years ago
- various docs (that are interesting, or not, depending on the point of view...)☆132Updated last year
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆46Updated 3 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91Updated 3 years ago
- Assets used in lecture "手を動かして理解するLinux Kernel Exploit" at SecurityCamp2023.☆17Updated 2 years ago
- ☆98Updated this week
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆69Updated last month
- Collection of browser challenges☆138Updated 4 years ago
- Linux kernel privilege escalation techniques☆151Updated last year
- angr tutorial for ctf☆163Updated 4 years ago
- ☆170Updated 11 months ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆195Updated last year
- ☆259Updated 4 months ago
- Simple script to find kernel objects of a certain size in the Linux kernel☆112Updated 3 years ago
- ☆45Updated 3 months ago
- My challenges for SECCON CTF 2022 Finals☆18Updated 2 years ago
- Linux & Android Kernel Vulnerability research and exploitation☆55Updated 2 years ago
- Source code for the DEF CON 32 CTF Qualifiers.☆76Updated last year
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆240Updated 11 months ago
- Source code for the DEF CON 31 CTF Qualifiers.☆126Updated 2 years ago