some kernel exploit challenges and cve analysis
☆26Nov 30, 2018Updated 7 years ago
Alternatives and similar repositories for kernel_exploit
Users that are interested in kernel_exploit are comparing it to the libraries listed below
Sorting:
- Papers related with kernel papers☆13Mar 18, 2023Updated 2 years ago
- ☆26May 10, 2021Updated 4 years ago
- ☆38Nov 30, 2020Updated 5 years ago
- ☆61Jun 20, 2022Updated 3 years ago
- Materials for my DMA attacks talk and a collection of related links☆64Jun 12, 2024Updated last year
- A tool for automatically identifying syscall-guard variables☆37Feb 10, 2026Updated 2 weeks ago
- ☆20Jun 7, 2025Updated 8 months ago
- ☆14Sep 19, 2022Updated 3 years ago
- ☆81Sep 7, 2023Updated 2 years ago
- python exp of pwnable' problems☆18Feb 5, 2024Updated 2 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Sep 4, 2019Updated 6 years ago
- CVE-2021-4154 exploit☆67Oct 7, 2022Updated 3 years ago
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆25Sep 5, 2021Updated 4 years ago
- ☆27Mar 16, 2023Updated 2 years ago
- ☆69Mar 27, 2019Updated 6 years ago
- ☆10Jul 9, 2020Updated 5 years ago
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- kernel exploit POC for vulnerability i found in amd gpu driver☆11Jan 6, 2023Updated 3 years ago
- exploit code for a bpf heap overflow vulnerability☆28Sep 3, 2019Updated 6 years ago
- GDB for pwn☆11Sep 10, 2025Updated 5 months ago
- Tzer: TVM Implementation of "Coverage-Guided Tensor Compiler Fuzzing with Joint IR-Pass Mutation (OOPSLA'22)“.☆12Jan 15, 2022Updated 4 years ago
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆16May 17, 2023Updated 2 years ago
- dc2020 quals kernel pwn☆12May 18, 2020Updated 5 years ago
- WCTF 2019 challenge☆103Jul 9, 2019Updated 6 years ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Apr 17, 2023Updated 2 years ago
- ReDeBug Source Code.☆24Dec 12, 2023Updated 2 years ago
- FuzzBuilderEx is a system to build seed corpus and fuzzing executables using the test framework automatically.☆13Sep 6, 2022Updated 3 years ago
- Wi-Fi Surveying: wardriving, datasets, statistics, tools, and more.☆15Oct 10, 2023Updated 2 years ago
- Exploitation primitives worth mentioning surrounding Glibc's Malloc implementation☆17Jun 26, 2018Updated 7 years ago
- MCPCorpus is a comprehensive dataset for analyzing the Model Context Protocol (MCP) ecosystem, containing ~14K MCP servers and 300 MCP cl…☆32Sep 1, 2025Updated 5 months ago
- Decompiler Fuzzing Test with EMI mutation☆16Apr 23, 2020Updated 5 years ago
- K-Miner☆74Jun 5, 2019Updated 6 years ago
- Evolving fuzzers with large language models☆17Dec 14, 2023Updated 2 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆90Sep 18, 2025Updated 5 months ago
- KLEESpectre is a symbolic execution engine with speculation semantic and cache modelling☆36Feb 28, 2020Updated 6 years ago
- gdb plugin for linux kernel to debug slub☆52May 11, 2020Updated 5 years ago
- Repo for FUZE project. I will also publish some Linux kernel LPE exploits for various real world kernel vulnerabilities here. the samples…☆504Sep 7, 2018Updated 7 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91May 12, 2022Updated 3 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Apr 29, 2021Updated 4 years ago