Notselwyn / kernel-scriptsLinks
A curated collection of scripts for kernel-related devops
☆13Updated 2 years ago
Alternatives and similar repositories for kernel-scripts
Users that are interested in kernel-scripts are comparing it to the libraries listed below
Sorting:
- Linux rootkit for educational purposes☆33Updated last year
- Research tools developed for Intel Wi-Fi chips☆56Updated 6 months ago
- A binary hardening system☆110Updated 2 years ago
- LKRG bypass methods☆73Updated 5 years ago
- Kernel Read Write Execute☆46Updated 11 months ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- ☆11Updated 3 years ago
- iTLB multihit PoC☆42Updated 2 years ago
- Files used for reproducing Fuzzware's experiments☆60Updated 2 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆29Updated 3 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆130Updated 3 years ago
- Curated collection of resources, examples and scripts for Linux kernel devs, researchers and hobbyists.☆61Updated 3 years ago
- HN Security's advisories.☆22Updated last month
- Uncovering Container Confusion in the Linux Kernel☆45Updated last year
- weggli ruleset scanner for source code and binaries☆35Updated last month
- Binary Ninja plugin to provide LLM assistance analyzing binaries.☆34Updated last week
- bash script and modified java program to headlessly use ghidra's decompiler☆58Updated 3 years ago
- ☆76Updated last year
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- A tool to perform so called BGE attack☆25Updated 6 months ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- ☆52Updated last year
- Binarly Vulnerability Research Advisories☆183Updated 2 months ago
- Vulnerabilities advisories and PoC☆18Updated 3 weeks ago
- Protocol Reverse Engineering Resources☆23Updated 2 years ago
- ☆79Updated last year
- ☆96Updated 5 years ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆53Updated 2 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated last year
- ☆21Updated 2 years ago