A curated collection of scripts for kernel-related devops
☆13Nov 23, 2023Updated 2 years ago
Alternatives and similar repositories for kernel-scripts
Users that are interested in kernel-scripts are comparing it to the libraries listed below
Sorting:
- Linux rootkit for educational purposes☆35Mar 27, 2024Updated last year
- Automated recovery of Linux kernel build configurations☆26Jan 14, 2022Updated 4 years ago
- Tool to extract the kallsyms (System.map) from a memory dump☆28Aug 17, 2023Updated 2 years ago
- revshell is a custom script to print a lot of reverse options to copy paste with a given IP and port☆19Nov 27, 2020Updated 5 years ago
- Code repository for experiments in SpecROP paper☆13Sep 3, 2021Updated 4 years ago
- Old and new CTFs about Linux kernel exploitation.☆64Mar 28, 2022Updated 3 years ago
- Collections of patterns for weggli to find nice bugs☆21Nov 30, 2023Updated 2 years ago
- Source code of the double-fetch bug detection approach based on Coccinelle engine☆10Jan 2, 2017Updated 9 years ago
- Aerospike Fork of the JEMalloc Memory Allocator☆26Feb 11, 2026Updated last month
- LLVM trunk with poolalloc trunk modified to compile only DSA☆12Jul 9, 2015Updated 10 years ago
- ☆13Mar 12, 2026Updated last week
- Spectre variant 1 exploitation via PRIME+PROBE☆10May 22, 2019Updated 6 years ago
- ☆15Jul 5, 2020Updated 5 years ago
- ☆17Oct 9, 2023Updated 2 years ago
- Ledger Donjon CTF 2020☆17Nov 16, 2021Updated 4 years ago
- Analysis on Kernel Self-Protection: Understanding Security and Performance Implication☆18Apr 20, 2020Updated 5 years ago
- ☆20Feb 17, 2026Updated last month
- kCFI Documentation☆15Apr 18, 2017Updated 8 years ago
- This rap optimizations and hl_cfi have be merged in hardenedlinux/linux-unofficial_grsec☆17Oct 3, 2019Updated 6 years ago
- ☆32Jun 13, 2023Updated 2 years ago
- Finite Element analysis within Grasshopper☆40Dec 16, 2024Updated last year
- Kiddy - (linux) kernel identity spoofer☆15Mar 18, 2024Updated 2 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (…☆22Sep 24, 2023Updated 2 years ago
- ☆17Jan 14, 2026Updated 2 months ago
- DUMB: An Example Architecture for Binary Ninja☆16Mar 1, 2020Updated 6 years ago
- A tool / library for simplifying string obfuscation with xor.☆22Jul 10, 2024Updated last year
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 6 years ago
- LSM BPF module to block pwnkit (CVE-2021-4034) like exploits☆21Feb 17, 2022Updated 4 years ago
- VM escape (QEMU, VirtualBox, VMware)☆17Mar 21, 2022Updated 3 years ago
- ☆25Jun 2, 2024Updated last year
- ☆12Sep 4, 2023Updated 2 years ago
- Analysis and exploitation of an use-after-free in ProFTPd☆12Jun 21, 2023Updated 2 years ago
- Medusa Repository: Transynther tool and Medusa Attack☆23Jul 17, 2020Updated 5 years ago
- Assembly Programming Learning Platform☆29Sep 16, 2012Updated 13 years ago
- Proof of Concept of exploit against Spectre Variant 2 Vulnerability☆23May 23, 2020Updated 5 years ago
- A collection of the themes I use for my laptop☆11Mar 7, 2024Updated 2 years ago
- ☆12Feb 16, 2024Updated 2 years ago
- ☆13Mar 25, 2022Updated 3 years ago
- Minimalistic Swayfx rice + Arch☆10Nov 12, 2023Updated 2 years ago