Linux Kernel exploitation Tutorial.
☆275Jun 30, 2020Updated 5 years ago
Alternatives and similar repositories for Kernel-exploit-tech
Users that are interested in Kernel-exploit-tech are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Example files to experience basic exploit techniques.☆74Apr 29, 2019Updated 7 years ago
- repository for kernel exploit practice☆418Nov 12, 2019Updated 6 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- An updated collection of resources targeting browser-exploitation.☆834Mar 8, 2021Updated 5 years ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆525Jun 28, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Lazenca A - Android Memory Cheat Tool(Engine)☆30Dec 25, 2017Updated 8 years ago
- by http://whereisk0shl.top/☆33Jul 9, 2018Updated 7 years ago
- A collection of links related to Linux kernel security and exploitation☆6,447Mar 7, 2026Updated 2 months ago
- Lazenca S - Anti-cheating Engine for Android Game☆23Dec 25, 2017Updated 8 years ago
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆766Jan 27, 2026Updated 3 months ago
- A collection of links related to VMware escape exploits☆1,490Sep 4, 2024Updated last year
- kernel-pwn and writeup collection☆718Oct 2, 2023Updated 2 years ago
- Fuzzing the Kernel Using Unicornafl and AFL++☆305Jan 2, 2023Updated 3 years ago
- The best vulnerable driver to learn how to exploit kernel vulnerability.☆33Oct 16, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆189Feb 8, 2025Updated last year
- Chakra vulnerability and exploit bypass all system mitigation☆81Jun 9, 2018Updated 7 years ago
- Various kernel exploits☆805Mar 14, 2024Updated 2 years ago
- Browser Fuzzing with Machine Learning☆22Mar 6, 2019Updated 7 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆90May 12, 2022Updated 4 years ago
- Green shellcode challenge tools☆22Apr 9, 2019Updated 7 years ago
- share some useful archives about vm and qemu escape exploit.☆590Mar 18, 2026Updated 2 months ago
- Linux Heap Exploitation Practice☆394Dec 1, 2018Updated 7 years ago
- My Chrome and Safari exploit code + write-up repo☆533Nov 5, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Android Kernel Exploitation☆647Feb 13, 2022Updated 4 years ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,287Jan 29, 2026Updated 3 months ago
- Repo for FUZE project. I will also publish some Linux kernel LPE exploits for various real world kernel vulnerabilities here. the samples…☆503Sep 7, 2018Updated 7 years ago
- awesome list of browser exploitation tutorials☆2,278Sep 18, 2023Updated 2 years ago
- ☆286Apr 23, 2020Updated 6 years ago
- Attacking-Edge-Through-the-JavaScript-Compiler☆92Feb 15, 2019Updated 7 years ago
- A set of Linux binary exploitation tasks for beginners on various architectures☆553Dec 26, 2021Updated 4 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆157Mar 3, 2021Updated 5 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆449Apr 11, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- V8 Tutorial PLDI 2019☆76Jul 23, 2019Updated 6 years ago
- Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018☆178Feb 7, 2024Updated 2 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆89May 7, 2024Updated 2 years ago
- An intentionally vulnerable linux driver for research purposes/practice in kernel exploit dev☆128Jun 25, 2017Updated 8 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆124Sep 9, 2020Updated 5 years ago
- A JavaScript Engine Fuzzer☆2,191May 6, 2026Updated last week
- A fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer☆345Aug 23, 2019Updated 6 years ago