some kernel exploit challenges and cve analysis
☆26Nov 30, 2018Updated 7 years ago
Alternatives and similar repositories for kernel_exploit
Users that are interested in kernel_exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Papers related with kernel papers☆13Mar 18, 2023Updated 3 years ago
- ☆25May 10, 2021Updated 4 years ago
- ☆61Jun 20, 2022Updated 3 years ago
- ☆38Nov 30, 2020Updated 5 years ago
- python exp of pwnable' problems☆18Apr 19, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A tool for automatically identifying syscall-guard variables☆37Feb 10, 2026Updated 2 months ago
- ReDeBug Source Code.☆24Dec 12, 2023Updated 2 years ago
- K-Miner☆75Jun 5, 2019Updated 6 years ago
- ☆70Mar 27, 2019Updated 7 years ago
- GDB for pwn☆11Sep 10, 2025Updated 7 months ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆63Sep 4, 2019Updated 6 years ago
- Materials for my DMA attacks talk and a collection of related links☆69Jun 12, 2024Updated last year
- ☆20Jun 7, 2025Updated 10 months ago
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆26Sep 5, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆81Sep 7, 2023Updated 2 years ago
- ☆16Jun 25, 2018Updated 7 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Jun 26, 2018Updated 7 years ago
- gdb plugin for linux kernel to debug slub☆52May 11, 2020Updated 5 years ago
- WCTF 2019 challenge☆103Jul 9, 2019Updated 6 years ago
- ☆16Sep 29, 2022Updated 3 years ago
- exploit code for a bpf heap overflow vulnerability☆27Sep 3, 2019Updated 6 years ago
- Decompiler Fuzzing Test with EMI mutation☆16Apr 23, 2020Updated 6 years ago
- a new cfi mechanism☆33Sep 23, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆14Sep 19, 2022Updated 3 years ago
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- CVE-2021-4154 exploit☆67Oct 7, 2022Updated 3 years ago
- A small tool for quickly generating LLVM passes☆29Sep 22, 2025Updated 7 months ago
- Updated IDA ReObjc Plugin for 7.4+ and python3☆13Apr 17, 2021Updated 5 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- ☆25Jun 2, 2024Updated last year
- Onsite Analysis Infrastructure☆16Jun 23, 2020Updated 5 years ago
- 近年来容器安全相关论文收集整理☆15May 26, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Repo for FUZE project. I will also publish some Linux kernel LPE exploits for various real world kernel vulnerabilities here. the samples…☆502Sep 7, 2018Updated 7 years ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 6 years ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆63Dec 2, 2024Updated last year
- ☆55Mar 9, 2022Updated 4 years ago
- ☆44Aug 8, 2022Updated 3 years ago
- D^3CTF 2022 d3bpf, d3bpf-v2 attachment, exp and official writeup☆12Mar 8, 2022Updated 4 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆90May 12, 2022Updated 3 years ago