Linux Exploits
☆141Jun 9, 2015Updated 10 years ago
Alternatives and similar repositories for lsploits
Users that are interested in lsploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sample code for ret2usr (and ret2dir) kernel attacks☆10Nov 23, 2016Updated 9 years ago
- A Return-oriented Programming toolkit☆352May 14, 2017Updated 8 years ago
- python library to examine ptmalloc (the glibc userland heap implementation)☆509May 11, 2021Updated 4 years ago
- Helper script for working with format string bugs☆57May 2, 2020Updated 5 years ago
- full exploit of pwnfest2016, slide and full text of syscan2017☆165Jun 14, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- For Linux binary Exploitation☆848Mar 26, 2018Updated 8 years ago
- Arm Episodes☆79Jan 25, 2018Updated 8 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- PEDA-like debugger UI for WinDbg☆207Mar 29, 2024Updated 2 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆144Oct 28, 2018Updated 7 years ago
- Heap exploitation technique bypassing heap ASLR☆49Sep 2, 2019Updated 6 years ago
- Some CTF write up☆257Aug 29, 2025Updated 8 months ago
- ☆51Mar 23, 2018Updated 8 years ago
- ☆90Jun 23, 2016Updated 9 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago
- gdb for pwn☆968Aug 29, 2025Updated 8 months ago
- 一步一步学ROP☆565Dec 16, 2015Updated 10 years ago
- CSAW CTF 2015 Linux kernel exploitation challenge☆38Nov 16, 2015Updated 10 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆95Nov 16, 2015Updated 10 years ago
- POC for XStream RCE☆13Dec 23, 2013Updated 12 years ago
- ctfwriteup☆24Mar 27, 2019Updated 7 years ago
- The slides and exploit of mosec2016☆112Jul 4, 2016Updated 9 years ago
- Some kernel fuzzing paper about windows and linux☆255Oct 9, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference☆53Apr 7, 2016Updated 10 years ago
- My CTF writeup☆26Mar 20, 2017Updated 9 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- DEFCON CTF 2017 Stuff of Shit by HITCON☆95Aug 8, 2017Updated 8 years ago
- ☆140Jul 17, 2017Updated 8 years ago
- ☆31Apr 20, 2016Updated 10 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆265Jul 6, 2017Updated 8 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- Better CodeEditor for Ida Pro.☆230Dec 25, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- OpenSource My ImageMagick Fuzzer ..☆297Jul 26, 2017Updated 8 years ago
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- ☆14May 8, 2017Updated 8 years ago
- A repository for learning various heap exploitation techniques.☆8,606Apr 24, 2026Updated last week
- Full exploit of CVE-2016-6754(BadKernel) and slide of SyScan360 2016☆152Nov 28, 2016Updated 9 years ago
- Radare Congress Stuff☆212Oct 26, 2025Updated 6 months ago