Assets used in lecture "手を動かして理解するLinux Kernel Exploit" at SecurityCamp2023.
☆17Sep 13, 2023Updated 2 years ago
Alternatives and similar repositories for seccamp23c2-assets
Users that are interested in seccamp23c2-assets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆19Dec 10, 2025Updated 3 months ago
- Slides of mine.☆12Apr 19, 2024Updated last year
- Proof-of-Concept of exploits that may be published☆23Oct 24, 2024Updated last year
- An example of a FUSE filesystem that can be used in kernel exploitation as a replacement for userfaultfd technique☆12Nov 24, 2022Updated 3 years ago
- Challenges for ImaginaryCTF 2023☆14Jul 29, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆107Aug 9, 2024Updated last year
- Linux rootkit experimentations☆19May 19, 2015Updated 10 years ago
- ☆15Sep 14, 2022Updated 3 years ago
- linux kernel cross page attack demo module☆32Mar 15, 2023Updated 3 years ago
- WinWinにしてあげたい☆10Jan 29, 2022Updated 4 years ago
- small cute utils for kernel challenges☆40Apr 23, 2024Updated last year
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 5 months ago
- ☆23Jul 28, 2023Updated 2 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- dc2020 quals kernel pwn☆12May 18, 2020Updated 5 years ago
- Static analysis tools for x86 assembly☆13Mar 3, 2017Updated 9 years ago
- Python library for CTFer☆175Feb 11, 2026Updated last month
- MSP430 Microcontroller CPU plugin for Hopper Disassembler☆12May 13, 2017Updated 8 years ago
- ☆32Sep 6, 2021Updated 4 years ago
- satshell☆12Jul 14, 2023Updated 2 years ago
- binary ninja cli for agents☆67Mar 14, 2026Updated 2 weeks ago
- Make implicit Perl imports explicit☆24Mar 11, 2026Updated 2 weeks ago
- Seccomp (libseccomp2) adapter for the Nim language☆11Jul 31, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A collection of YARA signatures that I have found around the web.☆11Apr 29, 2016Updated 9 years ago
- CPAN Security Advisory Database☆16Apr 2, 2021Updated 4 years ago
- A fast and powerful gadget finder and ROP chain generator. A research prototype for the ropbot paper accepted at NDSS'26.☆48Jan 22, 2026Updated 2 months ago
- Perl module that provides Mozilla's CA cert bundle in PEM format☆24Oct 23, 2022Updated 3 years ago
- Repository of exploits for research purposes☆15Jul 12, 2023Updated 2 years ago
- anti anti vm dll, used to hide VMWare characteristics as files, processes, services, registry values☆14Nov 29, 2016Updated 9 years ago
- Trigger the rowhammer bug on ARMv8☆35Apr 14, 2019Updated 6 years ago
- ☆21Apr 6, 2025Updated 11 months ago
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Jun 23, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Gamecube/Wii .DOL loader and Gecko PPC plugin for Hopper Disassembler☆22Jun 29, 2018Updated 7 years ago
- Kernel PWN Tooklkit aimed mainly for CTF players☆18Jul 31, 2024Updated last year
- ☆19Mar 7, 2026Updated 3 weeks ago
- The materials of the "Hypervisors for Hackers: Security from the Hardware Up" class held at Global Cybersecurity Camp 2026 Vietnam.☆55Mar 4, 2026Updated 3 weeks ago
- ☆190Feb 8, 2025Updated last year
- archive of the released challenges from corCTF 2021☆25Sep 20, 2021Updated 4 years ago
- A tool for synthesizing code-reuse attacks (aka ROP) from a reference program, powered by logical modeling of Ghidra's `p-code` IL.☆24Dec 25, 2025Updated 3 months ago