IAIK / SLUBStick
☆60Updated last month
Related projects: ⓘ
- ☆117Updated 7 months ago
- VirtFuzz is a Linux Kernel Fuzzer that uses VirtIO to provide inputs into the kernels subsystem. It is built with LibAFL.☆107Updated 3 months ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆103Updated 6 months ago
- ☆159Updated 6 months ago
- Spectre based on Linear Address Masking☆62Updated 9 months ago
- ☆171Updated 9 months ago
- ☆61Updated 6 months ago
- Simple script to find kernel objects of a certain size in the Linux kernel☆103Updated last year
- A tool for automating setup of kernel pwn challenges☆48Updated 3 months ago
- Linux Kernel Fuzzer Corpus☆127Updated this week
- Damn Vulenerable Kernel Module for kernel fuzzing☆46Updated 2 months ago
- Explore a live Linux kernel's memory using GDB☆112Updated last year
- ☆135Updated 3 months ago
- Binarly Vulnerability Research Advisories☆161Updated this week
- ASLR bypass without infoleak☆150Updated 2 years ago
- Same-Architecture Firmware Rehosting and Fuzzing☆103Updated last year
- A tool for firmware cartography☆135Updated 6 months ago
- CVE-2023-4911 proof of concept☆164Updated 11 months ago
- Use-After-Free in Netfilter nf_tables when processing batch requests CVE-2023-32233☆51Updated last year
- LPE exploit in the linux module n_gsm.c. This module is used to implement the GSM 07.10 multiplexing protocol. This type of error was “Ra…☆40Updated 3 months ago
- Binary Type Inference Ghidra Plugin☆138Updated 7 months ago
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆53Updated 2 months ago
- Uncovering Container Confusion in the Linux Kernel☆42Updated 6 months ago
- ☆303Updated 3 months ago
- ELF binary forensics tool for APT, virus, backdoor and rootkit detection☆42Updated 5 months ago
- Blogpost about optimizing binary-only fuzzing with AFL++☆61Updated 11 months ago
- ☆208Updated 5 months ago
- Linux kernel privilege escalation techniques☆103Updated last month
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆49Updated 5 months ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆95Updated 2 weeks ago