Notselwyn / kernel-scriptsLinks
A curated collection of scripts for kernel-related devops
☆13Updated last year
Alternatives and similar repositories for kernel-scripts
Users that are interested in kernel-scripts are comparing it to the libraries listed below
Sorting:
- Linux rootkit for educational purposes☆33Updated last year
- A binary hardening system☆109Updated last year
- Kernel Read Write Execute☆46Updated 8 months ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 9 months ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- ☆51Updated last year
- iTLB multihit PoC☆42Updated last year
- LKRG bypass methods☆73Updated 5 years ago
- Curated collection of resources, examples and scripts for Linux kernel devs, researchers and hobbyists.☆59Updated 2 years ago
- A tool to perform so called BGE attack☆25Updated 3 months ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆64Updated 11 months ago
- Uncovering Container Confusion in the Linux Kernel☆44Updated last year
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆14Updated 9 months ago
- ☆75Updated last year
- Files used for reproducing Fuzzware's experiments☆60Updated 2 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago
- weggli ruleset scanner for source code and binaries☆30Updated 2 weeks ago
- HN Security's advisories.☆22Updated 5 months ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆42Updated 2 years ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆119Updated last year
- 🔓 x86 Linux Kernel rootkit for Debian 9 (4.9.0-11-686-pae)☆35Updated 5 years ago
- CVE-2021-4154 exploit☆67Updated 2 years ago
- ☆53Updated 2 months ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆28Updated 3 years ago
- Investigating the bug behind CVE-2021-26708☆28Updated 4 years ago
- Binarly Vulnerability Research Advisories☆180Updated last week
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆39Updated 3 years ago