Notselwyn / kernel-scripts
A curated collection of scripts for kernel-related devops
☆13Updated last year
Alternatives and similar repositories for kernel-scripts:
Users that are interested in kernel-scripts are comparing it to the libraries listed below
- A Linux x86/x86-64 tool to trace registers and memory regions.☆37Updated 2 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 2 years ago
- Linux rootkit for educational purposes☆30Updated last year
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- Investigating the bug behind CVE-2021-26708☆27Updated 4 years ago
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago
- A collection of software bug types and articles showcasing the hunt for and exploitation of them.☆20Updated 4 years ago
- Binary Ninja plugin to automate the process of generating pseudo-C code, running Semgrep over the pseudo-C, and presenting the results.☆26Updated last month
- HN Security's advisories.☆22Updated 5 months ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆26Updated 3 years ago
- Tools for Linux kernel debugging on Bochs (including symbols, native Bochs debugger and IDA PRO)☆31Updated last year
- Dixie Vuln Scanner Binja Plugin☆10Updated 11 months ago
- weggli ruleset scanner for source code and binaries☆26Updated 3 months ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆13Updated 3 months ago
- Debugger and analyzer for ARM ELF executables.☆19Updated 2 years ago
- CTF challenges that I created☆18Updated 3 years ago
- Uncovering Container Confusion in the Linux Kernel☆43Updated last year
- hypervisor enforced patch protection for the linux kernel with xen + libvmi, libvmi KASLR offset spoofer☆29Updated 11 months ago
- 🔓 x86 Linux Kernel rootkit for Debian 9 (4.9.0-11-686-pae)☆34Updated 5 years ago
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Updated last year
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43Updated last year
- Data graphing library for command line.☆15Updated 3 years ago
- A tool to perform so called BGE attack☆24Updated 11 months ago
- PoC multi-layer protector for ELF32 x86 binaries☆11Updated 3 years ago
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆29Updated 2 years ago
- PoC code and tools for Black Hat USA 2024☆21Updated 7 months ago
- A repository with UEFI research stuff☆14Updated last year
- Breaking Secure Boot with SMM☆40Updated 2 years ago