├── ASIS_2020 ├── refcnt │ ├── chall │ ├── libc.so.6 │ └── xpl.py └── vote │ └── xpl.py ├── Exploitation2-CSAW_CTF_Qualification_Round_2013 ├── exploit.py └── exploitation2 ├── README.md ├── VUPlayer_2.49_Windows_exploit ├── 39adeb7fa4711cd1cac8702fb163ded5-vuplayersetup.exe └── exploit.py ├── agenda_UAD360 ├── agenda_main ├── exploit.py └── libc-2.27-level2.so ├── babypwn_CODEGATE_2017 ├── babypwn └── exploit.py ├── chromatic_aberration ├── bin │ ├── .ninja_deps │ ├── .ninja_log │ ├── bytecode_builtins_list_generator │ ├── d8 │ ├── d8_sandbox │ ├── gen-regexp-special-case │ ├── icudtl.dat │ ├── mksnapshot │ ├── peda-session-d8.txt │ ├── snapshot_blob.bin │ ├── torque │ └── v8_build_config.json ├── diff.diff └── pwn.js ├── iSmartViewPro_1.5_Windows_exploit ├── exploit.py └── iSmartViewPro_v1.5.exe ├── lottery_UAD360 ├── exploit.py ├── libc-2.24-level1.so └── lottery_main ├── oldbridge_hackthebox_challenge └── oldbridge_HTB.zip ├── one_SECCON_2019 ├── exploit.py ├── libc-2.27.so_18292bd12d37bfaf58e8dded9db7f1f5da1192cb └── one_ef36d5ef6169aeda65259f627f282930b93cf6e5 ├── penpal_world_redpwnCTF2019 ├── exploit.py ├── libc-2.27.so └── penpal_world ├── r0pbaby_defcon_challenge ├── exploit.py └── r0pbaby_542ee6516410709a1421141501f03760 ├── ropme_hackthebox_challenge └── exploit.zip ├── smasher_exploit_hackthebox ├── leak │ └── exploit.py └── no_leak │ └── exploit.py ├── windows_kernel_exploitation_hevd ├── EPROCESS_token_stealing │ └── notes.pdf ├── Kernel_Buffer_Overflow │ └── exploit.cpp └── Shellcoding_token_stealing │ ├── notes.pdf │ ├── shellcode.asm │ └── shellcode.exe └── xkcd_heartbleed_defcon_challenge ├── exploit.py ├── flag └── xkcd /ASIS_2020/refcnt/chall: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/ASIS_2020/refcnt/chall -------------------------------------------------------------------------------- /ASIS_2020/refcnt/libc.so.6: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/ASIS_2020/refcnt/libc.so.6 -------------------------------------------------------------------------------- /ASIS_2020/refcnt/xpl.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/ASIS_2020/refcnt/xpl.py -------------------------------------------------------------------------------- /ASIS_2020/vote/xpl.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/ASIS_2020/vote/xpl.py -------------------------------------------------------------------------------- /Exploitation2-CSAW_CTF_Qualification_Round_2013/exploit.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/Exploitation2-CSAW_CTF_Qualification_Round_2013/exploit.py -------------------------------------------------------------------------------- /Exploitation2-CSAW_CTF_Qualification_Round_2013/exploitation2: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/Exploitation2-CSAW_CTF_Qualification_Round_2013/exploitation2 -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/README.md -------------------------------------------------------------------------------- /VUPlayer_2.49_Windows_exploit/39adeb7fa4711cd1cac8702fb163ded5-vuplayersetup.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/VUPlayer_2.49_Windows_exploit/39adeb7fa4711cd1cac8702fb163ded5-vuplayersetup.exe -------------------------------------------------------------------------------- /VUPlayer_2.49_Windows_exploit/exploit.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/VUPlayer_2.49_Windows_exploit/exploit.py -------------------------------------------------------------------------------- /agenda_UAD360/agenda_main: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/agenda_UAD360/agenda_main -------------------------------------------------------------------------------- /agenda_UAD360/exploit.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/agenda_UAD360/exploit.py -------------------------------------------------------------------------------- /agenda_UAD360/libc-2.27-level2.so: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/agenda_UAD360/libc-2.27-level2.so -------------------------------------------------------------------------------- /babypwn_CODEGATE_2017/babypwn: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/babypwn_CODEGATE_2017/babypwn -------------------------------------------------------------------------------- /babypwn_CODEGATE_2017/exploit.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/babypwn_CODEGATE_2017/exploit.py -------------------------------------------------------------------------------- /chromatic_aberration/bin/.ninja_deps: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/chromatic_aberration/bin/.ninja_deps -------------------------------------------------------------------------------- /chromatic_aberration/bin/.ninja_log: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/chromatic_aberration/bin/.ninja_log -------------------------------------------------------------------------------- /chromatic_aberration/bin/bytecode_builtins_list_generator: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/chromatic_aberration/bin/bytecode_builtins_list_generator -------------------------------------------------------------------------------- /chromatic_aberration/bin/d8: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/chromatic_aberration/bin/d8 -------------------------------------------------------------------------------- /chromatic_aberration/bin/d8_sandbox: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/chromatic_aberration/bin/d8_sandbox -------------------------------------------------------------------------------- /chromatic_aberration/bin/gen-regexp-special-case: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/chromatic_aberration/bin/gen-regexp-special-case -------------------------------------------------------------------------------- /chromatic_aberration/bin/icudtl.dat: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/chromatic_aberration/bin/icudtl.dat -------------------------------------------------------------------------------- /chromatic_aberration/bin/mksnapshot: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/chromatic_aberration/bin/mksnapshot -------------------------------------------------------------------------------- /chromatic_aberration/bin/peda-session-d8.txt: -------------------------------------------------------------------------------- 1 | 2 | -------------------------------------------------------------------------------- /chromatic_aberration/bin/snapshot_blob.bin: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/chromatic_aberration/bin/snapshot_blob.bin -------------------------------------------------------------------------------- /chromatic_aberration/bin/torque: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/chromatic_aberration/bin/torque -------------------------------------------------------------------------------- /chromatic_aberration/bin/v8_build_config.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/chromatic_aberration/bin/v8_build_config.json -------------------------------------------------------------------------------- /chromatic_aberration/diff.diff: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/chromatic_aberration/diff.diff -------------------------------------------------------------------------------- /chromatic_aberration/pwn.js: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/chromatic_aberration/pwn.js -------------------------------------------------------------------------------- /iSmartViewPro_1.5_Windows_exploit/exploit.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/iSmartViewPro_1.5_Windows_exploit/exploit.py -------------------------------------------------------------------------------- /iSmartViewPro_1.5_Windows_exploit/iSmartViewPro_v1.5.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/iSmartViewPro_1.5_Windows_exploit/iSmartViewPro_v1.5.exe -------------------------------------------------------------------------------- /lottery_UAD360/exploit.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/lottery_UAD360/exploit.py -------------------------------------------------------------------------------- /lottery_UAD360/libc-2.24-level1.so: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/lottery_UAD360/libc-2.24-level1.so -------------------------------------------------------------------------------- /lottery_UAD360/lottery_main: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/lottery_UAD360/lottery_main -------------------------------------------------------------------------------- /oldbridge_hackthebox_challenge/oldbridge_HTB.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/oldbridge_hackthebox_challenge/oldbridge_HTB.zip -------------------------------------------------------------------------------- /one_SECCON_2019/exploit.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/one_SECCON_2019/exploit.py -------------------------------------------------------------------------------- /one_SECCON_2019/libc-2.27.so_18292bd12d37bfaf58e8dded9db7f1f5da1192cb: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/one_SECCON_2019/libc-2.27.so_18292bd12d37bfaf58e8dded9db7f1f5da1192cb -------------------------------------------------------------------------------- /one_SECCON_2019/one_ef36d5ef6169aeda65259f627f282930b93cf6e5: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/one_SECCON_2019/one_ef36d5ef6169aeda65259f627f282930b93cf6e5 -------------------------------------------------------------------------------- /penpal_world_redpwnCTF2019/exploit.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/penpal_world_redpwnCTF2019/exploit.py -------------------------------------------------------------------------------- /penpal_world_redpwnCTF2019/libc-2.27.so: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/penpal_world_redpwnCTF2019/libc-2.27.so -------------------------------------------------------------------------------- /penpal_world_redpwnCTF2019/penpal_world: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/penpal_world_redpwnCTF2019/penpal_world -------------------------------------------------------------------------------- /r0pbaby_defcon_challenge/exploit.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/r0pbaby_defcon_challenge/exploit.py -------------------------------------------------------------------------------- /r0pbaby_defcon_challenge/r0pbaby_542ee6516410709a1421141501f03760: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/r0pbaby_defcon_challenge/r0pbaby_542ee6516410709a1421141501f03760 -------------------------------------------------------------------------------- /ropme_hackthebox_challenge/exploit.zip: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/ropme_hackthebox_challenge/exploit.zip -------------------------------------------------------------------------------- /smasher_exploit_hackthebox/leak/exploit.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/smasher_exploit_hackthebox/leak/exploit.py -------------------------------------------------------------------------------- /smasher_exploit_hackthebox/no_leak/exploit.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/smasher_exploit_hackthebox/no_leak/exploit.py -------------------------------------------------------------------------------- /windows_kernel_exploitation_hevd/EPROCESS_token_stealing/notes.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/windows_kernel_exploitation_hevd/EPROCESS_token_stealing/notes.pdf -------------------------------------------------------------------------------- /windows_kernel_exploitation_hevd/Kernel_Buffer_Overflow/exploit.cpp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/windows_kernel_exploitation_hevd/Kernel_Buffer_Overflow/exploit.cpp -------------------------------------------------------------------------------- /windows_kernel_exploitation_hevd/Shellcoding_token_stealing/notes.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/windows_kernel_exploitation_hevd/Shellcoding_token_stealing/notes.pdf -------------------------------------------------------------------------------- /windows_kernel_exploitation_hevd/Shellcoding_token_stealing/shellcode.asm: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/windows_kernel_exploitation_hevd/Shellcoding_token_stealing/shellcode.asm -------------------------------------------------------------------------------- /windows_kernel_exploitation_hevd/Shellcoding_token_stealing/shellcode.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/windows_kernel_exploitation_hevd/Shellcoding_token_stealing/shellcode.exe -------------------------------------------------------------------------------- /xkcd_heartbleed_defcon_challenge/exploit.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/xkcd_heartbleed_defcon_challenge/exploit.py -------------------------------------------------------------------------------- /xkcd_heartbleed_defcon_challenge/flag: -------------------------------------------------------------------------------- 1 | HPYS{34zy_h34rtbl33d_3xpl0it} 2 | -------------------------------------------------------------------------------- /xkcd_heartbleed_defcon_challenge/xkcd: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/KaoRz/exploits_challenges/HEAD/xkcd_heartbleed_defcon_challenge/xkcd --------------------------------------------------------------------------------