Linux Exploits
☆141Jun 9, 2015Updated 10 years ago
Alternatives and similar repositories for lsploits
Users that are interested in lsploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sample code for ret2usr (and ret2dir) kernel attacks☆10Nov 23, 2016Updated 9 years ago
- A Return-oriented Programming toolkit☆353May 14, 2017Updated 8 years ago
- python library to examine ptmalloc (the glibc userland heap implementation)☆509May 11, 2021Updated 4 years ago
- Helper script for working with format string bugs☆57May 2, 2020Updated 5 years ago
- full exploit of pwnfest2016, slide and full text of syscan2017☆165Jun 14, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- For Linux binary Exploitation☆848Mar 26, 2018Updated 8 years ago
- Arm Episodes☆78Jan 25, 2018Updated 8 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- PEDA-like debugger UI for WinDbg☆206Mar 29, 2024Updated 2 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆144Oct 28, 2018Updated 7 years ago
- Heap exploitation technique bypassing heap ASLR☆49Sep 2, 2019Updated 6 years ago
- Some CTF write up☆256Aug 29, 2025Updated 7 months ago
- ☆51Mar 23, 2018Updated 8 years ago
- ☆90Jun 23, 2016Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago
- gdb for pwn☆968Aug 29, 2025Updated 7 months ago
- 一步一步学ROP☆570Dec 16, 2015Updated 10 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆38Nov 16, 2015Updated 10 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆94Nov 16, 2015Updated 10 years ago
- POC for XStream RCE☆13Dec 23, 2013Updated 12 years ago
- ctfwriteup☆25Mar 27, 2019Updated 7 years ago
- The slides and exploit of mosec2016☆112Jul 4, 2016Updated 9 years ago
- Some kernel fuzzing paper about windows and linux☆255Oct 9, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference☆52Apr 7, 2016Updated 10 years ago
- My CTF writeup☆26Mar 20, 2017Updated 9 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- DEFCON CTF 2017 Stuff of Shit by HITCON☆95Aug 8, 2017Updated 8 years ago
- ☆140Jul 17, 2017Updated 8 years ago
- ☆31Apr 20, 2016Updated 9 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆265Jul 6, 2017Updated 8 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- Better CodeEditor for Ida Pro.☆230Dec 25, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- OpenSource My ImageMagick Fuzzer ..☆298Jul 26, 2017Updated 8 years ago
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- ☆14May 8, 2017Updated 8 years ago
- A repository for learning various heap exploitation techniques.☆8,583Mar 26, 2026Updated 2 weeks ago
- Full exploit of CVE-2016-6754(BadKernel) and slide of SyScan360 2016☆152Nov 28, 2016Updated 9 years ago
- Radare Congress Stuff☆213Oct 26, 2025Updated 5 months ago