|
axium
A C-based CTF kernel exploit development library.
|
Before a kernel panics, the system is not chaotic.
panix captures the moment of failure. axium is concerned with what exists before that moment — the unnamed assumptions, the implicit structures, and the minimal conditions under which an exploit becomes possible.
Axium is not a framework, and it is not a collection of tricks. It is a set of low-level primitives refined through repetition: touching memory, interfering with object lifetimes, and shifting the boundaries between data flow and control flow.
There is no "automatic exploitation" here. Only a dialogue between you and the kernel about causality, assumptions, and cost.
Axium makes it easy to iterate on exploits without fighting the build system.
The default workspace is exp.c.
Build and link any .c file with axium primitives on the fly:
Or specify the source explicitly:
Axium can generate a single "amalgamated" C file that includes both your script and the entire library source. This is ideal for CTF write-ups or environments where you cannot easily upload multiple files.
Note: Building any script (for example, make my_exp) automatically generates its bundled version.
Every file in src/tests/**/*.c is treated as an independent binary.
Special thanks to Vlex for donating the domain hyphony.com to this project.