mito753

CTF kernel exploitation notes, PoCs, exploits, and writeups.

98
11
100% credibility
Found May 19, 2026 at 123 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
C
AI Summary

Kernel-Exploit-Dojo is a curated archive of over 100 Linux kernel exploitation CTF challenges organized by bug class, exploitation technique, difficulty, and solve count, intended for educational learning in local lab environments.

Star Growth

See how this repo grew from 123 to 98 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is Kernel-Exploit-Dojo?

Kernel-Exploit-Dojo is a curated archive of over 100 Linux kernel exploitation CTF challenges, organized by bug class, exploitation primitive, final technique, difficulty, and solve count. Each challenge directory contains exploit code and detailed technical writeups explaining the attack path. The project focuses on practical kernel pwn techniques like UAF, heap spraying, pipe_buffer abuse, msg_msg manipulation, modprobe_path overwrite, and cred overwriting. Written in C with QEMU-based testing environments, it serves as both a learning resource and technical index for security researchers studying kernel vulnerability exploitation.

Why is it gaining traction?

This repository stands out because it bridges the gap between theoretical kernel security research and hands-on exploitation practice. Unlike scattered writeups across various blogs, this project centralizes challenges from multiple CTF events (HITCON, SECCON, hxp, Google CTF, and many others) into a single searchable index. The bilingual format (English and Japanese) expands its accessibility. The techniques index allows practitioners to navigate by exploitation primitive rather than hunting through individual challenge folders. For developers learning kernel exploitation, having verified working exploits alongside detailed explanations significantly reduces the learning curve.

Who should use this?

Security researchers and CTF players preparing for kernel pwn challenges will find the most value here. Red team members studying kernel-level privilege escalation techniques can use the documented exploit paths as reference material. Bug hunters looking to understand common kernel vulnerability patterns and their exploitation will benefit from the categorized challenge collection. Academic courses covering operating system security could leverage this as practical coursework material. Developers working on kernel hardening or security tools might use it to understand attacker methodologies.

Verdict

Kernel-Exploit-Dojo is a valuable niche resource for kernel exploitation learning, earning its place as a specialized reference despite the modest 98-star community size and 1.0% credibility score. The comprehensive organization and detailed writeups make it worthwhile for serious kernel security study, though users should verify exploit compatibility with current kernel versions before deployment.

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.