un1c0rn-the-pwnie / FSOPAgain
FSOP Again
☆22Updated 3 years ago
Alternatives and similar repositories for FSOPAgain:
Users that are interested in FSOPAgain are comparing it to the libraries listed below
- All Files, Scripts, and exploits can be found here☆64Updated 4 years ago
- A tool for automating setup of kernel pwn challenges☆55Updated 5 months ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 3 years ago
- ☆46Updated last year
- A BinaryNinja plugin for contextual gadget analysis and semantic/hueristic based querying.☆60Updated 3 weeks ago
- The danger of repetivive format string vulnerabilities and abusing exit on full RELRO☆19Updated 2 years ago
- Code execution via corrupting mmap malloc chunks with ASLR bypass☆42Updated 2 years ago
- various docs (that are interesting, or not, depending on the point of view...)☆113Updated last year
- Old and new CTFs about Linux kernel exploitation.☆54Updated 3 years ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆58Updated 6 months ago
- Linux & Android Kernel Vulnerability research and exploitation☆40Updated last year
- a new class of file structure attacks☆50Updated 2 years ago
- ☆175Updated 2 months ago
- small cute utils for kernel challenges☆35Updated last year
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆186Updated last year
- Extendable Visualization & Exploitation tool for glibc heap☆57Updated 8 months ago
- Writeups for CTFs☆69Updated last month
- ☆50Updated 6 years ago
- My personnal repository☆10Updated last year
- A fast, multithreaded, ROP-gadget semantics analyzer.☆49Updated 4 years ago
- ASLR bypass without infoleak☆160Updated 3 years ago
- archive of the released challenges from corCTF 2021☆22Updated 3 years ago
- Simple script to find kernel objects of a certain size in the Linux kernel☆109Updated 2 years ago
- my writeups (mainly pwnable)☆33Updated 7 months ago
- A cheat sheet that summarises "strategies" (or techniques) to use with angr.☆31Updated 4 years ago
- Cross-architecture instruction counting for CTF solving☆46Updated 3 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆98Updated 2 months ago
- ☆205Updated this week
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆76Updated 5 months ago
- ☆26Updated 3 years ago