veritas501 / hbp_attack_demo
linux kernel LPE using hw_breakpoint attack tech demo
☆25Updated 2 years ago
Alternatives and similar repositories for hbp_attack_demo:
Users that are interested in hbp_attack_demo are comparing it to the libraries listed below
- Merge multi binaries into one IDA database.☆24Updated 3 years ago
- ☆16Updated last year
- study https://github.com/n132/Libc-GOT-Hijacking☆13Updated last year
- some ida script☆31Updated 3 years ago
- qemu vulnerablity.☆50Updated 3 years ago
- linux kernel cross page attack demo module☆30Updated 2 years ago
- ☆39Updated last year
- attachment and write up for D^3CTF 2023's pwn challenge - d3kcache☆33Updated 9 months ago
- A gdb plugin for linux kernel.☆26Updated last year
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆22Updated 2 years ago
- attachments for forum of RealWorld CTF 3rd☆41Updated 4 years ago
- Files related to the Pwn2Own Toronto 2023 exploit against the Xiaomi 13 Pro.☆23Updated 5 months ago
- Qemu Fuzzer.针对Qemu模拟设备的模糊测试工具,主要思路是Host生成种子Data,然后传递给Guest中转程序,由中转程序访问MMIO,以达到和模拟设备的交互,不同于qtest自带的fuzzer.☆44Updated 3 years ago
- ☆28Updated last year
- An exploit primitive in linux kernel inspired by DirtyPipe☆91Updated 2 years ago
- CVE-2022-25636 exploit rewritten with pipe primitive☆19Updated 2 years ago
- CTF Write-ups☆29Updated 3 years ago
- ☆31Updated last year
- A collection of resources and information about CVE-2023-2033☆19Updated last year
- Debug pwn in docker, no need for virtual machines☆35Updated 2 years ago
- ☆26Updated last year
- python exp of pwnable' problems☆18Updated last year
- ☆35Updated last year
- ☆10Updated 3 years ago
- ☆62Updated last year
- A V8 Sandbox Escape Technique.☆16Updated last month
- some useful scripts to solve pwn challenges in ctfs☆13Updated 4 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆72Updated 2 years ago
- Repository of the findings found by wtf when fuzzing IDA75.☆87Updated 3 years ago
- ☆30Updated 4 years ago