Automated recovery of Linux kernel build configurations
☆26Jan 14, 2022Updated 4 years ago
Alternatives and similar repositories for bn-kconfig-recover
Users that are interested in bn-kconfig-recover are comparing it to the libraries listed below
Sorting:
- Binary Ninja plugin for importing symbols to a kernel binary from /proc/kallsyms☆21Oct 3, 2025Updated 5 months ago
- Tool to extract the kallsyms (System.map) from a memory dump☆29Aug 17, 2023Updated 2 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆101Apr 5, 2022Updated 3 years ago
- Linux network namespace sysctl safety verifier.☆11Jun 20, 2021Updated 4 years ago
- Binary Ninja plugin suite for SEGA Genesis ROM hacking☆27Nov 4, 2024Updated last year
- A curated collection of scripts for kernel-related devops☆13Nov 23, 2023Updated 2 years ago
- ROPMate is the first Visual Analytics system specifically designed to assist human in composing ROP chains with the desired semantics.☆27Feb 3, 2021Updated 5 years ago
- ☆28Aug 26, 2025Updated 6 months ago
- House of Gods Heap Exploitation Technique☆19Dec 5, 2022Updated 3 years ago
- Kriss Kross Jump-themed SEGA Genesis ROM CTF Challenge (Because why not?)☆15May 5, 2019Updated 6 years ago
- 2018 Advent Calendar browser pwnables☆15Feb 14, 2019Updated 7 years ago
- Old and new CTFs about Linux kernel exploitation.☆64Mar 28, 2022Updated 3 years ago
- My-CTF-Challenges☆15Sep 27, 2021Updated 4 years ago
- IDA Pro Python plugin to analyze and annotate Linux kernel alternatives☆24Dec 15, 2021Updated 4 years ago
- Microsoft Edge MemGC Internals☆17Sep 2, 2015Updated 10 years ago
- BinaryNinja plugin to introduce some quality of life utilities for obsessive compulsive CTF enthusiasts☆24Jul 31, 2024Updated last year
- Project Vault Range PoC: Know your enemy and yourself to build better defense-in-depth solution!☆47Apr 5, 2025Updated 11 months ago
- pwntools library implementation in c++☆49Apr 11, 2021Updated 4 years ago
- Add debugging tools to an existing initramfs, even if it is for a foreign architecture☆24Aug 28, 2024Updated last year
- SALT - SLUB ALlocator Tracer for the Linux kernel☆156Sep 10, 2018Updated 7 years ago
- Visualize IonMonkey CFGs using GraphViz.☆51Dec 12, 2019Updated 6 years ago
- ☆103Nov 20, 2022Updated 3 years ago
- Mazda RX8 hacking / reverse engineering notes and example code☆27Mar 1, 2022Updated 4 years ago
- Port of the classic first-person-shooter DOOM to Xbox for DEFCON 27 CTF☆26Aug 20, 2019Updated 6 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- ASLREKT is a proof of concept for an unfixed generic local ASLR bypass in Linux.☆26Feb 10, 2020Updated 6 years ago
- Teleporter is a simple application for sending files from Point A to Point B☆34Feb 27, 2023Updated 3 years ago
- Linux Kernel N-day Exploit/Analysis.☆65Oct 21, 2024Updated last year
- A collection of some useful Ghidra scripts☆35May 23, 2021Updated 4 years ago
- FSOP Again☆35Apr 3, 2022Updated 3 years ago
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆29Nov 20, 2021Updated 4 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Nov 4, 2022Updated 3 years ago
- ☆27May 25, 2022Updated 3 years ago
- Esorics 2021 - Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains☆59Dec 7, 2021Updated 4 years ago
- A thorough library database to assist with binary exploitation tasks.☆194Aug 1, 2022Updated 3 years ago
- Tool to view heap chunks and memory writes (using pintool)☆42Dec 8, 2018Updated 7 years ago
- ☆35Oct 25, 2021Updated 4 years ago
- ☆31Jul 5, 2020Updated 5 years ago
- A tool for finding the one gadget RCE in libc☆76May 30, 2020Updated 5 years ago