Stars
My CTF journey since 2015. Stats, writeups, code snippets, notes, challenges.
Capacity: Cryptographically-Enforced In-process Capabilities for Modern ARM Architectures
Prototype Implementation of "A Formal Approach to Multi-Layered Privileges for Enclaves" (NDSS 2025)
KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities (Best Practical Paper Award of RAID 2024)
Andersen's inclusion-based pointer analysis re-implementation in LLVM
Static Value-Flow Analysis Framework for Source Code
Challenge repository for the 2023 CSAW CTF Qualifiers
An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.
cwe_checker finds vulnerable patterns in binary executables
[USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel
Solutions to some reverse engineering CTF style challenges
Gemini is a modern LaTex beamerposter theme 🖼
🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024
Spectre V1 Proof-of-Concept Attack in the Rust Language
A lightweight process isolation tool that utilizes Linux namespaces, cgroups, rlimits and seccomp-bpf syscall filters, leveraging the Kafel BPF language for enhanced security.
The materials of "Hypervisor 101 in Rust", a one-day long course, to quickly learn hardware-assisted virtualization technology and its application for high-performance fuzzing on Intel/AMD processors.