KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities | 🏆 Best Practical Paper Award of RAID 2024
☆85Oct 15, 2025Updated 7 months ago
Alternatives and similar repositories for KernJC
Users that are interested in KernJC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TeLL: Log Level Suggestions via Modeling Multi-Level Code Block Information, ISSTA'22☆14Jul 14, 2022Updated 3 years ago
- ☆30Nov 30, 2024Updated last year
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆75Aug 8, 2022Updated 3 years ago
- attachment and write up for D^3CTF 2023's pwn challenge - d3kcache☆41Jun 28, 2024Updated last year
- ☆17Aug 19, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆26Sep 5, 2021Updated 4 years ago
- CVE-2022-0185 exploit rewritten with pipe primitive☆16Apr 5, 2022Updated 4 years ago
- ☆23Jul 18, 2023Updated 2 years ago
- ☆13Apr 13, 2023Updated 3 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆89May 7, 2024Updated 2 years ago
- ☆39Feb 4, 2026Updated 3 months ago
- A gdb plugin for linux kernel.☆27Jul 14, 2023Updated 2 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆39Nov 26, 2024Updated last year
- 云原生安全漏洞收集☆18Jul 9, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- SyzScope is a research project that aims to reveal high-risk security bugs on Syzbot. Learn more details in our paper.☆84Jan 20, 2025Updated last year
- IEEE S&P 2023 - DEVFUZZ: Automatic Device Model-Guided Device Driver Fuzzing☆14Dec 16, 2024Updated last year
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆33Apr 6, 2022Updated 4 years ago
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- Industrial Cybersecurity Conference Index☆13Mar 11, 2024Updated 2 years ago
- Research developed by Allele Security Intelligence.☆18Jul 21, 2025Updated 10 months ago
- uacatcher open source repo☆22Jul 22, 2023Updated 2 years ago
- A collection of various exploits☆30Sep 17, 2024Updated last year
- ☆50Mar 12, 2026Updated 2 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Investigating the bug behind CVE-2021-26708☆28Feb 16, 2021Updated 5 years ago
- An standalone execution trace library built on DynamoRIO.☆23Jul 4, 2022Updated 3 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆14Sep 19, 2023Updated 2 years ago
- UBGen can generate programs with undefined behaviors (e.g., buffer-overflow, use-after-free, etc.)☆62May 16, 2025Updated last year
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆70Nov 13, 2025Updated 6 months ago
- A novel and interpretable ML-based approach to classify malware with high accuracy and explain the classification result meanwhile.☆29Nov 23, 2022Updated 3 years ago
- Official repository of SyzRisk [ASIA CCS'24]☆12Aug 20, 2024Updated last year
- OCaml hacking ideas, small and large.☆20Apr 9, 2024Updated 2 years ago
- PalanTír: Optimizing Attack Provenance with Hardware-enhanced System Observability, ACM CCS'22☆24Nov 11, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Apr 17, 2023Updated 3 years ago
- CVE-2024-37051 poc and exploit☆29Jun 11, 2024Updated last year
- ☆10Mar 3, 2024Updated 2 years ago
- ☆189Feb 8, 2025Updated last year
- An exploit primitive in linux kernel inspired by DirtyPipe☆101Apr 5, 2022Updated 4 years ago
- Linux Bluetooth - Run arbitrary management commands as an unprivileged user☆85May 31, 2023Updated 2 years ago
- Read only mirror - No pull requests☆21May 7, 2021Updated 5 years ago