Markakd / kernel_exploit
Linux kernel exploit
☆12Updated 3 years ago
Alternatives and similar repositories for kernel_exploit:
Users that are interested in kernel_exploit are comparing it to the libraries listed below
- A mini bytecode Interpreter for v8.☆23Updated 2 years ago
- exploit for dirtycow☆13Updated 2 years ago
- A small PoC for the recent RCE found in the Goahead Webserver prior to version 5.1.5.☆21Updated 3 years ago
- Collection of slides☆33Updated 8 months ago
- A collection of resources and information about CVE-2023-2033☆19Updated last year
- This is a crash for Brave Browser I found in New Years Eve, used to be a 0day when I found it☆16Updated last year
- Windows Etw LPE☆50Updated 3 years ago
- PolicyKit CVE-2021-3560 Exploitation (Authentication Agent)☆24Updated last year
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆26Updated last year
- ☆19Updated 5 months ago
- 快速对自己 项目中引入的第三方开源库进行1day patch检索,patch数据每天晚上11点更新☆20Updated 2 years ago
- CVE-2021-4204: Linux Kernel eBPF Local Privilege Escalation☆61Updated 2 years ago
- 一个基于 Qiling 的 函数仿真工具。可以从一个 ELF 文件中选取特定函数执行,并将执行结果导出。☆13Updated 2 years ago
- Project Vault Range PoC: Know your enemy and yourself to build better defense-in-depth solution!☆42Updated 3 months ago
- ☆10Updated 3 years ago
- This tool is used to handle firmware that binwalk cannot unpack directly and is mainly used for OOB removal, ECC removal, and bad block r…☆16Updated 2 years ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆18Updated 2 years ago
- Windows Security Resources☆63Updated 3 years ago
- attachments for forum of RealWorld CTF 3rd☆41Updated 4 years ago
- minimum ELF64 program to calculate its own SHA256.☆18Updated 2 years ago
- CVE-2022-0185 exploit rewritten with pipe primitive☆16Updated 2 years ago
- linux kernel internals research details☆45Updated last year
- ☆6Updated 3 years ago
- clfs CVE 的一些 POC 收集☆16Updated 2 years ago
- 让ELF以特定libc链接运行,带符号版本☆14Updated 4 years ago
- ☆11Updated 3 years ago
- Vulnerability Research and Proof of Concept exploits for various targets☆34Updated 2 years ago