Notselwyn / kernel-scriptsLinks
A curated collection of scripts for kernel-related devops
☆13Updated 2 years ago
Alternatives and similar repositories for kernel-scripts
Users that are interested in kernel-scripts are comparing it to the libraries listed below
Sorting:
- Linux rootkit for educational purposes☆34Updated last year
- ☆52Updated last year
- LKRG bypass methods☆73Updated 6 years ago
- A binary hardening system☆111Updated 2 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 4 years ago
- Curated collection of resources, examples and scripts for Linux kernel devs, researchers and hobbyists.☆62Updated 3 years ago
- Launch radare2 like a boss from pwntools in tmux☆23Updated 6 years ago
- Binarly Vulnerability Research Advisories☆185Updated last week
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆16Updated last year
- bash script and modified java program to headlessly use ghidra's decompiler☆57Updated 3 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆132Updated 3 years ago
- Kernel Read Write Execute☆46Updated last year
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 7 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆40Updated 3 years ago
- iTLB multihit PoC☆42Updated 2 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated last year
- Intro to Assembly Optimization stream repo☆30Updated 4 years ago
- An example of hijacking the dynamic linker with a custom interpreter who loads and executes modular viruses☆66Updated 3 years ago
- Linux kernel internals' notes☆20Updated last week
- My attempt to teach others about microprocessors and programming in IA-32 and IA-64 assembly, and to spread the word of how awesome it is…☆28Updated 3 years ago
- CVE-2021-4154 exploit☆67Updated 3 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 3 years ago
- Research tools developed for Intel Wi-Fi chips☆56Updated 7 months ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 5 years ago
- Code injection from Linux kernel to a process☆24Updated 2 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆29Updated 3 years ago
- Files used for reproducing Fuzzware's experiments☆61Updated 2 years ago
- A FREE comprehensive step-by-step embedded Assembler tutorial covering the basics including coding your own vector table and linker scrip…☆43Updated 2 months ago
- Protocol Reverse Engineering Resources☆23Updated 2 years ago
- Reverse engineering the TI AM3358 boot ROM☆60Updated last year