exploit code for a bpf heap overflow vulnerability
☆28Sep 3, 2019Updated 6 years ago
Alternatives and similar repositories for kernel4.20_bpf_LPE
Users that are interested in kernel4.20_bpf_LPE are comparing it to the libraries listed below
Sorting:
- ☆16Jun 23, 2024Updated last year
- dc2020 quals kernel pwn☆12May 18, 2020Updated 5 years ago
- ☆12Sep 8, 2020Updated 5 years ago
- Merge multi binaries into one IDA database.☆24Jan 18, 2022Updated 4 years ago
- ☆26May 10, 2021Updated 4 years ago
- My-CTF-Challenges☆15Sep 27, 2021Updated 4 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- ☆121Apr 1, 2018Updated 7 years ago
- multiarch qemu system env for playing and debugging :)☆32Nov 3, 2021Updated 4 years ago
- Repo for FUZE project. I will also publish some Linux kernel LPE exploits for various real world kernel vulnerabilities here. the samples…☆504Sep 7, 2018Updated 7 years ago
- ☆16Jun 9, 2023Updated 2 years ago
- android root tools by myself.☆31Aug 22, 2019Updated 6 years ago
- ☆103Mar 8, 2022Updated 3 years ago
- ☆19Jun 14, 2018Updated 7 years ago
- Exploit Firefox Vulnerability☆24May 25, 2020Updated 5 years ago
- Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018☆180Feb 7, 2024Updated 2 years ago
- ☆176May 2, 2019Updated 6 years ago
- ☆32Nov 15, 2017Updated 8 years ago
- K-Miner☆74Jun 5, 2019Updated 6 years ago
- GDB plug-in that helps exploiting the Linux kernel's SLUB allocator☆97Mar 29, 2023Updated 2 years ago
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Sep 4, 2019Updated 6 years ago
- CVE-2021-4154 exploit☆67Oct 7, 2022Updated 3 years ago
- I am still working on it☆12Apr 30, 2020Updated 5 years ago
- QEMU escape code☆63Jun 6, 2021Updated 4 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆101Apr 5, 2022Updated 3 years ago
- Improvised json-based configurable Windows sandbox☆11Sep 29, 2020Updated 5 years ago
- CVE-2022-3910☆12Mar 14, 2023Updated 2 years ago
- Real firmware fuzz-tested with uEmu☆13Mar 22, 2023Updated 2 years ago
- Python script to split Android boot.img files.☆12Nov 11, 2012Updated 13 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆103Nov 24, 2019Updated 6 years ago
- A linux system call fuzzer using TriforceAFL☆177Feb 28, 2024Updated 2 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- poc for cve-2017-10661☆11Aug 11, 2017Updated 8 years ago
- IDA_Signsrch in Python☆106Jan 31, 2026Updated last month
- Code and slides for Zer0Con 2018 talk: Building a 1-day Exploit for Google Chrome☆156Apr 1, 2018Updated 7 years ago
- ROPMate is the first Visual Analytics system specifically designed to assist human in composing ROP chains with the desired semantics.☆27Feb 3, 2021Updated 5 years ago
- ☆15Apr 3, 2022Updated 3 years ago
- on Mac 10.12.2☆20Aug 3, 2018Updated 7 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Nov 4, 2022Updated 3 years ago