Linux Kernel N-day Exploit/Analysis.
☆65Oct 21, 2024Updated last year
Alternatives and similar repositories for LinuxKernel-nday
Users that are interested in LinuxKernel-nday are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Nov 9, 2022Updated 3 years ago
- CVE-2025-38001: Linux HFSC Eltree Use-After-Free - Debian 12 PoC☆93Jul 11, 2025Updated 8 months ago
- ☆23Jan 27, 2026Updated last month
- Slides of mine.☆12Apr 19, 2024Updated last year
- ☆126Aug 3, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 11 months ago
- CTFs and solutions for Linux binary exploitation.☆113Jun 9, 2024Updated last year
- ☆31Feb 20, 2022Updated 4 years ago
- ☆16Jun 23, 2024Updated last year
- Exploit Firefox Vulnerability☆24May 25, 2020Updated 5 years ago
- ☆32Jun 13, 2023Updated 2 years ago
- ☆46Jan 23, 2022Updated 4 years ago
- ☆97Jan 9, 2021Updated 5 years ago
- ☆86Sep 19, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Repository for slide decks of public talks I've given.☆14Apr 23, 2023Updated 2 years ago
- ☆273Aug 2, 2025Updated 7 months ago
- This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.☆49Sep 16, 2024Updated last year
- ☆312Jul 10, 2023Updated 2 years ago
- HEVD Exploit: BufferOverflowNonPagedPoolNx on Windows 10 22H2 - Escalating from Low Integrity to SYSTEM via Aligned Chunk Confusion☆64Apr 22, 2025Updated 11 months ago
- Mickey's Blogs☆42Updated this week
- ☆128Nov 12, 2024Updated last year
- Android 14 kernel exploit for Pixel7/8 Pro☆547Apr 23, 2024Updated last year
- Automated recovery of Linux kernel build configurations☆26Jan 14, 2022Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆448Oct 3, 2024Updated last year
- Windows Win32 Kernel Subsystem☆37Aug 23, 2025Updated 7 months ago
- Pyload RCE with js2py sandbox escape☆17Oct 26, 2024Updated last year
- ☆38Jan 6, 2025Updated last year
- ☆14Dec 26, 2022Updated 3 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Environment with vulnerable kernel for exploitation of the TEE driver (CVE-2021-44733)☆77Dec 28, 2021Updated 4 years ago
- ☆32Jul 1, 2021Updated 4 years ago
- View Linux perf traces in IDA Pro☆15Nov 18, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- LPE exploit for CVE-2024-0582 (io_uring)☆101Mar 29, 2024Updated last year
- ☆22Dec 1, 2025Updated 3 months ago
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆284May 27, 2023Updated 2 years ago
- ☆37Nov 16, 2023Updated 2 years ago
- Exploit code for CVE-2021-1961☆122Sep 7, 2022Updated 3 years ago
- SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice☆16May 19, 2025Updated 10 months ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Jan 6, 2022Updated 4 years ago