smallkirby / lysitheaLinks
small cute utils for kernel challenges
☆37Updated last year
Alternatives and similar repositories for lysithea
Users that are interested in lysithea are comparing it to the libraries listed below
Sorting:
- a new class of file structure attacks☆50Updated 2 years ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆78Updated 6 months ago
- PAWNYABLE!☆208Updated last year
- my writeups (mainly pwnable)☆33Updated 8 months ago
- A tool for automating setup of kernel pwn challenges☆55Updated 6 months ago
- ☆18Updated last year
- Python library for CTFer☆143Updated last month
- various docs (that are interesting, or not, depending on the point of view...)☆113Updated last year
- CTF pwn problem writeup☆39Updated 2 years ago
- ☆177Updated 3 months ago
- Linux kernel privilege escalation techniques☆138Updated 9 months ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆82Updated 3 years ago
- Collection of browser challenges☆137Updated 4 years ago
- ☆211Updated last week
- Old and new CTFs about Linux kernel exploitation.☆55Updated 3 years ago
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆43Updated 2 years ago
- ☆46Updated last year
- Add debugging tools to an existing initramfs, even if it is for a foreign architecture☆23Updated 9 months ago
- A GDB+GEF-style debugger for unloading Python pickles☆67Updated 5 months ago
- A bunch of V8 resources (with a security focus)☆24Updated last week
- ☆73Updated last year
- ☆71Updated last year
- A Linux Kernel Exploitation C Library☆10Updated this week
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆188Updated last year
- This is a PWN challenges repo.######## 1f y0u l1ke, g1v3 m3 a star~☆36Updated 4 years ago
- My challenges for SECCON CTF 2022 Finals☆18Updated 2 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆121Updated 7 years ago
- angr tutorial for ctf☆150Updated 4 years ago
- ☆26Updated 3 years ago
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆21Updated 3 years ago