☆19Nov 19, 2024Updated last year
Alternatives and similar repositories for Kernel-Exploitation-Notes
Users that are interested in Kernel-Exploitation-Notes are comparing it to the libraries listed below
Sorting:
- ☆22Dec 1, 2025Updated 3 months ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- [D^3CTF 2023] pwn-d3TrustedHTTPd attachment, source code and official writeup☆10May 3, 2023Updated 2 years ago
- Tooling to shim libfuzzer <-> golang native fuzzing☆13May 9, 2024Updated last year
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 3 months ago
- A VPN written in Rust☆13Apr 17, 2025Updated 10 months ago
- ☆16Updated this week
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- Source code for MA4270: Data Modelling and Computation on Transformers and Nadaraya-Watson Kernel Regression☆19May 29, 2024Updated last year
- This is the repository for the code and artifacts related to the CCS2022 paper: C2C: Fine-grained Configuration-driven System Call Filter…☆11Nov 4, 2022Updated 3 years ago
- Java bindings for Google cpu_features☆10Jun 20, 2024Updated last year
- ☆13Mar 23, 2023Updated 2 years ago
- Arbitrary command execution on Open Folder via .vscode/tasks.json☆33Jan 19, 2026Updated last month
- Pointer analysis prototype (currently including anderson, steensgard).☆16Dec 20, 2021Updated 4 years ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- Beacon Object File (BOF) for identifying dependent child services of a given parent.☆19Jun 20, 2025Updated 8 months ago
- ☆11Oct 10, 2023Updated 2 years ago
- Go HackerOne API Client☆11May 16, 2024Updated last year
- iPod shuffle 3 bootrom exploit (Pwnage 2.0)☆15Nov 30, 2024Updated last year
- Dreg's setup for lldb reversing. The simplest and easiest possible, without scripting. lldb debugging setup.☆14May 2, 2024Updated last year
- A tracker DLL which enables 'NTAPI->Syscall' tracking whenever it is loaded. It calls 'NtSetInformationProcess' API call with a callback …☆14Oct 21, 2024Updated last year
- Implementing AES 256 CBC in AES-NI - MASM Format☆19Aug 9, 2025Updated 6 months ago
- A proposal for Next.js cache invalidation on demand by setting a custom server☆11Apr 13, 2022Updated 3 years ago
- ☆37Feb 3, 2026Updated last month
- Web File Manager☆11Aug 21, 2025Updated 6 months ago
- malloc for memory-mapped files☆14Jun 25, 2020Updated 5 years ago
- A set of tools and exploits to cause DoS for remote Windows Server & Windows 11 machines☆32Feb 9, 2026Updated 3 weeks ago
- CVE-2018-19320 LPE Exploit☆10Jun 19, 2023Updated 2 years ago
- A stager and implant that executes remote Web Assembly☆37Feb 4, 2026Updated 3 weeks ago
- Context-aware Nmap reconnaissance framework with traffic intelligence and AD awareness☆26Feb 4, 2026Updated 3 weeks ago
- An example of an external LLVM plugin module transform pass for the latest versions.☆14Oct 21, 2025Updated 4 months ago
- Full Stack application for a school database using React and a custom REST API.☆11Jan 16, 2024Updated 2 years ago
- PatchFuzz: Fuzzing for JavaScript Engine Incomplete Security Patches☆19Dec 17, 2025Updated 2 months ago
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 10 months ago
- ☆12Oct 19, 2022Updated 3 years ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 8 months ago