xairy / easy-linux-pwn
A set of Linux binary exploitation tasks for beginners on various architectures
☆516Updated 2 years ago
Related projects: ⓘ
- Some pwn challenges selected for training and education.☆377Updated last year
- Linux Heap Exploitation Practice☆377Updated 5 years ago
- Various kernel exploits☆732Updated 6 months ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆787Updated 4 years ago
- An updated collection of resources targeting browser-exploitation.☆807Updated 3 years ago
- For Linux binary Exploitation☆812Updated 6 years ago
- CTF Writeups: Collection of CTF "technical" writeups by PersianCats.☆211Updated last year
- An archive of low-level CTF challenges developed over the years☆598Updated 2 years ago
- Collection of scripts and writeups☆319Updated 2 years ago
- repository for kernel exploit practice☆382Updated 4 years ago
- Provide powerful tools for seccomp analysis☆962Updated last week
- A colleciton of CTF write-ups all using pwntools☆495Updated 7 years ago
- Using Intel's PIN tool to solve CTF problems☆486Updated 4 years ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆497Updated 2 months ago
- kernel-pwn and writeup collection☆550Updated 11 months ago
- A collection of links related to VMware escape exploits☆1,354Updated 2 weeks ago
- The Damn Vulnerable Router Firmware Project☆667Updated 3 years ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,106Updated last year
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆624Updated 3 weeks ago
- A Course on Intermediate Level Linux Exploitation☆977Updated 4 years ago
- share some useful archives about vm and qemu escape exploit.☆496Updated 5 months ago
- CTF Reversing Challenges List☆265Updated 5 years ago
- gdb for pwn☆884Updated last month
- My Chrome and Safari exploit code + write-up repo☆528Updated 2 years ago
- Perfect Blue's CTF Writeups☆664Updated 2 months ago
- A collection of pwn/CTF related utilities for Ghidra☆657Updated last week
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆1,839Updated last month
- A docker environment for pwn in ctf☆731Updated 10 months ago
- Very vulnerable ARM/AARCH64 application (CTF style exploitation tutorial with 14 vulnerability techniques)☆886Updated 2 years ago