Linux & Android Kernel Vulnerability research and exploitation
☆64Dec 12, 2023Updated 2 years ago
Alternatives and similar repositories for Linux-Kernel-VR-Exploitation
Users that are interested in Linux-Kernel-VR-Exploitation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Activate Windows & Office 🔑☆12Jun 15, 2024Updated last year
- Everything you need to build and run Linux and Android kernels for exploit development☆103Apr 9, 2024Updated 2 years ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆54Dec 8, 2023Updated 2 years ago
- A collection of in-depth studies authored by me on JavaScript engine vulnerabilities.☆49Feb 6, 2026Updated 2 months ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆201Mar 14, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- kernel-pwn and writeup collection☆710Oct 2, 2023Updated 2 years ago
- eastXueLian's reservoir of CTF puzzles.☆16Nov 27, 2024Updated last year
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆86Jul 9, 2025Updated 9 months ago
- Windows Pwnable Study☆414Jun 16, 2025Updated 9 months ago
- A central place to store statically compiled tools I use when auditing a Linux based device.☆14Sep 28, 2020Updated 5 years ago
- ☆278Aug 2, 2025Updated 8 months ago
- Old and new CTFs about Linux kernel exploitation.☆63Mar 28, 2022Updated 4 years ago
- A curated list of browser fuzzing researches, papers, tools, ...☆14Jan 30, 2023Updated 3 years ago
- narly.js - print binary protections with Windbg JS (/SafeSEH, /GS, ASLR, etc.)☆15Nov 14, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆923May 20, 2024Updated last year
- ELF Virus infection techniques that work with SCOP (Secure code partitioned) executables☆15May 13, 2019Updated 6 years ago
- A list of curated papers focusing on Network Protocol Fuzzing.☆14Jul 5, 2022Updated 3 years ago
- 搜集的一些kernel paper☆26Feb 19, 2020Updated 6 years ago
- ☆27Jan 8, 2022Updated 4 years ago
- SCTF 2023 kernel pwn && CVE-2023-3640☆29Jul 17, 2023Updated 2 years ago
- ☆190Feb 8, 2025Updated last year
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆112Jul 25, 2019Updated 6 years ago
- a dkom rootkit that targets windows x64 systems. the rootkit hooks and edits criticl memory sections in order to hide different resources…☆19Jul 5, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- PatchFuzz: Fuzzing for JavaScript Engine Incomplete Security Patches☆20Dec 17, 2025Updated 3 months ago
- Android 14 kernel exploit for Pixel7/8 Pro☆549Apr 23, 2024Updated last year
- CTF pwn problem writeup☆42Apr 23, 2023Updated 2 years ago
- Papers related with kernel papers☆13Mar 18, 2023Updated 3 years ago
- Microprocessor 2 Lab Template☆11Apr 29, 2024Updated last year
- Android Kernel Exploitation☆643Feb 13, 2022Updated 4 years ago
- For V8CTF M123☆17Aug 25, 2024Updated last year
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆107Feb 12, 2025Updated last year
- HexRaysPyTools merged! (@NyaMisty @oopsmishap @Tim-Sobolev @OrbitOn-line)☆15Dec 15, 2025Updated 3 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- 웹 브라우저 취약점 탐지 자동화 프로젝트☆11Jan 8, 2022Updated 4 years ago
- Harness for fuzzing GoldSrc file formats with WinAFL☆20Apr 26, 2020Updated 5 years ago
- ☆54Feb 14, 2026Updated last month
- Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215☆66Sep 4, 2022Updated 3 years ago
- A curated list of Grammar based fuzzing research papers, codes, tutorials☆130Jun 30, 2022Updated 3 years ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆129Nov 15, 2025Updated 4 months ago
- Python常用代码段☆11Sep 8, 2021Updated 4 years ago