Linux kernel module implementation & exploitation (pwn) labs.
☆212Jan 26, 2022Updated 4 years ago
Alternatives and similar repositories for Linux-Kernel-Exploitation
Users that are interested in Linux-Kernel-Exploitation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 台大 計算機安全 - Pwn 簡報、影片、作業題目與解法 - Computer Security Fall 2019 @ CSIE NTU Taiwan☆404Nov 28, 2021Updated 4 years ago
- kernel-pwn and writeup collection☆712Oct 2, 2023Updated 2 years ago
- Fuzzing tutorial with easy-to-learn labs 🚀☆164Sep 4, 2022Updated 3 years ago
- CTF write-ups☆195May 8, 2022Updated 3 years ago
- PAWNYABLE!☆236May 30, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆26Feb 24, 2022Updated 4 years ago
- ☆43Dec 2, 2021Updated 4 years ago
- ☆72Feb 1, 2024Updated 2 years ago
- MediaTek Fuzzing Workshop in HITCON 2021☆62Apr 28, 2022Updated 4 years ago
- ☆299Jun 21, 2022Updated 3 years ago
- ☆228Dec 9, 2020Updated 5 years ago
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆763Jan 27, 2026Updated 3 months ago
- An open source practical cryptography course for CTF player☆118Feb 22, 2021Updated 5 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆90May 12, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Include CVE vulnerability analyze, ctf pwn and documents for Browser-pwn☆187Dec 25, 2020Updated 5 years ago
- repository for kernel exploit practice☆417Nov 12, 2019Updated 6 years ago
- 2021 交大程式安全 binary exploit 課程教材☆302Jun 4, 2024Updated last year
- The exploit generator CRAX++ is CRAX with a plugin system, s2e 2.0 upgrade, dynamic ROP, code selection, and I/O states (HITCON 2022)☆104Jan 13, 2023Updated 3 years ago
- Some pwn challenges selected for training and education.☆389Jun 26, 2023Updated 2 years ago
- ☆176May 2, 2019Updated 6 years ago
- HITCON electric badge for HITCON CMT 2019.☆77Mar 19, 2020Updated 6 years ago
- ☆394Oct 2, 2022Updated 3 years ago
- ☆26Dec 17, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- My pwn challeges for AIS3 2019 Pre-exam.☆34Jun 19, 2019Updated 6 years ago
- I am still working on it☆11Apr 30, 2020Updated 5 years ago
- Kernel development & exploitation practice environment.☆252Sep 10, 2023Updated 2 years ago
- gdb for pwn☆968Aug 29, 2025Updated 8 months ago
- A collection of links related to Linux kernel security and exploitation☆6,419Mar 7, 2026Updated last month
- AIS3 2020 pre-exam writeup☆10Jun 30, 2020Updated 5 years ago
- Collection of scripts and writeups☆321Dec 14, 2021Updated 4 years ago
- Write-ups for various CTF☆216Sep 2, 2025Updated 7 months ago
- Provide powerful tools for seccomp analysis☆1,109Apr 21, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A proper well structured documentation for getting started with chrome pwning & v8 pwning☆199Jul 27, 2022Updated 3 years ago
- ☆342Jan 23, 2022Updated 4 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆157Mar 3, 2021Updated 5 years ago
- exploit code for a bpf heap overflow vulnerability☆27Sep 3, 2019Updated 6 years ago
- public archive for corCTF 2023☆18Aug 6, 2023Updated 2 years ago
- Basic pwntools for Windows☆269Apr 22, 2023Updated 3 years ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆108Jan 13, 2026Updated 3 months ago