Linux Exploits
☆141Jun 9, 2015Updated 10 years ago
Alternatives and similar repositories for lsploits
Users that are interested in lsploits are comparing it to the libraries listed below
Sorting:
- A Return-oriented Programming toolkit☆353May 14, 2017Updated 8 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆144Oct 28, 2018Updated 7 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago
- Helper script for working with format string bugs☆57May 2, 2020Updated 5 years ago
- python library to examine ptmalloc (the glibc userland heap implementation)☆507May 11, 2021Updated 4 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- For Linux binary Exploitation☆844Mar 26, 2018Updated 7 years ago
- Some CTF write up☆255Aug 29, 2025Updated 6 months ago
- Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference☆52Apr 7, 2016Updated 9 years ago
- full exploit of pwnfest2016, slide and full text of syscan2017☆165Jun 14, 2017Updated 8 years ago
- ☆51Mar 23, 2018Updated 7 years ago
- Arm Episodes☆78Jan 25, 2018Updated 8 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Heap exploitation technique bypassing heap ASLR☆49Sep 2, 2019Updated 6 years ago
- gdb for pwn☆963Aug 29, 2025Updated 6 months ago
- DEFCON CTF 2017 Stuff of Shit by HITCON☆95Aug 8, 2017Updated 8 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆94Nov 16, 2015Updated 10 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Jun 30, 2018Updated 7 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Jun 6, 2017Updated 8 years ago
- Full exploit of CVE-2016-6754(BadKernel) and slide of SyScan360 2016☆152Nov 28, 2016Updated 9 years ago
- My CTF writeup☆26Mar 20, 2017Updated 8 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- The slides and exploit of mosec2016☆112Jul 4, 2016Updated 9 years ago
- ☆91Jun 23, 2016Updated 9 years ago
- Sample code for ret2usr (and ret2dir) kernel attacks☆10Nov 23, 2016Updated 9 years ago
- https://exploit-exercises.com/fusion/☆20Dec 29, 2015Updated 10 years ago
- PEDA-like debugger UI for WinDbg☆206Mar 29, 2024Updated last year
- Some kernel fuzzing paper about windows and linux☆255Oct 9, 2017Updated 8 years ago
- ☆26May 7, 2018Updated 7 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- 一步一步学ROP☆567Dec 16, 2015Updated 10 years ago
- ☆140Jul 17, 2017Updated 8 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Exploiting CVE-2016-0040 uninitialized pointer☆45Jul 17, 2016Updated 9 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Linux Heap Exploitation Practice☆395Dec 1, 2018Updated 7 years ago
- A Python interface to AFL, allowing for easy injection of testcases and other functionality.☆645Apr 30, 2019Updated 6 years ago