Assets used in lecture "手を動かして理解するLinux Kernel Exploit" at SecurityCamp2023.
☆17Sep 13, 2023Updated 2 years ago
Alternatives and similar repositories for seccamp23c2-assets
Users that are interested in seccamp23c2-assets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆19Dec 10, 2025Updated 3 months ago
- Slides of mine.☆12Apr 19, 2024Updated last year
- Proof-of-Concept of exploits that may be published☆23Oct 24, 2024Updated last year
- An example of a FUSE filesystem that can be used in kernel exploitation as a replacement for userfaultfd technique☆12Nov 24, 2022Updated 3 years ago
- Challenges for ImaginaryCTF 2023☆14Jul 29, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆107Aug 9, 2024Updated last year
- Linux rootkit experimentations☆19May 19, 2015Updated 10 years ago
- ☆15Sep 14, 2022Updated 3 years ago
- linux kernel cross page attack demo module☆32Mar 15, 2023Updated 3 years ago
- WinWinにしてあげたい☆10Jan 29, 2022Updated 4 years ago
- small cute utils for kernel challenges☆40Apr 23, 2024Updated last year
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 5 months ago
- ☆23Jul 28, 2023Updated 2 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- dc2020 quals kernel pwn☆12May 18, 2020Updated 5 years ago
- Static analysis tools for x86 assembly☆13Mar 3, 2017Updated 9 years ago
- Python library for CTFer☆175Feb 11, 2026Updated last month
- MSP430 Microcontroller CPU plugin for Hopper Disassembler☆12May 13, 2017Updated 8 years ago
- ☆32Sep 6, 2021Updated 4 years ago
- satshell☆12Jul 14, 2023Updated 2 years ago
- binary ninja cli for agents☆67Mar 14, 2026Updated 2 weeks ago
- Make implicit Perl imports explicit☆24Mar 11, 2026Updated 2 weeks ago
- Seccomp (libseccomp2) adapter for the Nim language☆11Jul 31, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A collection of YARA signatures that I have found around the web.☆11Apr 29, 2016Updated 9 years ago
- CPAN Security Advisory Database☆16Apr 2, 2021Updated 4 years ago
- A fast and powerful gadget finder and ROP chain generator. A research prototype for the ropbot paper accepted at NDSS'26.☆48Jan 22, 2026Updated 2 months ago
- Perl module that provides Mozilla's CA cert bundle in PEM format☆24Oct 23, 2022Updated 3 years ago
- Repository of exploits for research purposes☆15Jul 12, 2023Updated 2 years ago
- anti anti vm dll, used to hide VMWare characteristics as files, processes, services, registry values☆14Nov 29, 2016Updated 9 years ago
- Trigger the rowhammer bug on ARMv8☆35Apr 14, 2019Updated 6 years ago
- ☆21Apr 6, 2025Updated 11 months ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Jun 23, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A Gamecube/Wii .DOL loader and Gecko PPC plugin for Hopper Disassembler☆22Jun 29, 2018Updated 7 years ago
- Kernel PWN Tooklkit aimed mainly for CTF players☆18Jul 31, 2024Updated last year
- ☆19Mar 7, 2026Updated 3 weeks ago
- The materials of the "Hypervisors for Hackers: Security from the Hardware Up" class held at Global Cybersecurity Camp 2026 Vietnam.☆55Mar 4, 2026Updated 3 weeks ago
- ☆190Feb 8, 2025Updated last year
- archive of the released challenges from corCTF 2021☆25Sep 20, 2021Updated 4 years ago
- A tool for synthesizing code-reuse attacks (aka ROP) from a reference program, powered by logical modeling of Ghidra's `p-code` IL.☆24Dec 25, 2025Updated 3 months ago