Linux Kernel exploitation Tutorial.
☆274Jun 30, 2020Updated 5 years ago
Alternatives and similar repositories for Kernel-exploit-tech
Users that are interested in Kernel-exploit-tech are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Example files to experience basic exploit techniques.☆74Apr 29, 2019Updated 6 years ago
- repository for kernel exploit practice☆415Nov 12, 2019Updated 6 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- An updated collection of resources targeting browser-exploitation.☆830Mar 8, 2021Updated 5 years ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆521Jun 28, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Lazenca A - Android Memory Cheat Tool(Engine)☆32Dec 25, 2017Updated 8 years ago
- by http://whereisk0shl.top/☆35Jul 9, 2018Updated 7 years ago
- Lazenca S - Anti-cheating Engine for Android Game☆23Dec 25, 2017Updated 8 years ago
- A collection of links related to Linux kernel security and exploitation☆6,392Mar 7, 2026Updated last month
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆765Jan 27, 2026Updated 2 months ago
- A collection of links related to VMware escape exploits☆1,494Sep 4, 2024Updated last year
- kernel-pwn and writeup collection☆708Oct 2, 2023Updated 2 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆305Jan 2, 2023Updated 3 years ago
- The best vulnerable driver to learn how to exploit kernel vulnerability.☆34Oct 16, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆190Feb 8, 2025Updated last year
- Chakra vulnerability and exploit bypass all system mitigation☆82Jun 9, 2018Updated 7 years ago
- Various kernel exploits☆803Mar 14, 2024Updated 2 years ago
- Browser Fuzzing with Machine Learning☆22Mar 6, 2019Updated 7 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91May 12, 2022Updated 3 years ago
- Green shellcode challenge tools☆22Apr 9, 2019Updated 6 years ago
- share some useful archives about vm and qemu escape exploit.☆585Mar 18, 2026Updated 3 weeks ago
- Linux Heap Exploitation Practice☆395Dec 1, 2018Updated 7 years ago
- My Chrome and Safari exploit code + write-up repo☆532Nov 5, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Android Kernel Exploitation☆643Feb 13, 2022Updated 4 years ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,285Jan 29, 2026Updated 2 months ago
- Repo for FUZE project. I will also publish some Linux kernel LPE exploits for various real world kernel vulnerabilities here. the samples…☆502Sep 7, 2018Updated 7 years ago
- awesome list of browser exploitation tutorials☆2,273Sep 18, 2023Updated 2 years ago
- ☆285Apr 23, 2020Updated 5 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆91Feb 15, 2019Updated 7 years ago
- A set of Linux binary exploitation tasks for beginners on various architectures☆551Dec 26, 2021Updated 4 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆157Mar 3, 2021Updated 5 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆446Apr 11, 2025Updated 11 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- V8 Tutorial PLDI 2019☆78Jul 23, 2019Updated 6 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆92May 7, 2024Updated last year
- Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018☆180Feb 7, 2024Updated 2 years ago
- Linux kernel exploitation experiments☆395Mar 25, 2026Updated 2 weeks ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆130Jun 25, 2017Updated 8 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆124Sep 9, 2020Updated 5 years ago
- A JavaScript Engine Fuzzer☆2,172Mar 30, 2026Updated last week