Notselwyn / kernel-scriptsLinks
A curated collection of scripts for kernel-related devops
☆13Updated 2 years ago
Alternatives and similar repositories for kernel-scripts
Users that are interested in kernel-scripts are comparing it to the libraries listed below
Sorting:
- Linux rootkit for educational purposes☆34Updated last year
- LKRG bypass methods☆73Updated 6 years ago
- Kernel Read Write Execute☆46Updated last year
- A binary hardening system☆111Updated 2 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 4 years ago
- Protocol Reverse Engineering Resources☆23Updated 2 years ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31Updated 3 years ago
- bash script and modified java program to headlessly use ghidra's decompiler☆57Updated 3 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated last year
- Implementation of Max Kellermann's exploit for CVE-2022-0847☆12Updated 3 years ago
- Curated collection of resources, examples and scripts for Linux kernel devs, researchers and hobbyists.☆62Updated 3 years ago
- Launch radare2 like a boss from pwntools in tmux☆23Updated 6 years ago
- ☆52Updated last year
- HN Security's advisories.☆22Updated 3 months ago
- DC540 hacking challenge 0x00002 [MicroPython CTF].☆12Updated 2 months ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆69Updated last year
- Full exploit for D-Link DCS-5020L, POC crash for others that are vulnerable as well.☆42Updated 3 years ago
- iTLB multihit PoC☆42Updated 2 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Updated 2 years ago
- A FREE comprehensive step-by-step embedded Assembler tutorial covering the basics including coding your own vector table and linker scrip…☆43Updated 2 months ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆96Updated 2 years ago
- An injector that use PT_LOAD technique☆12Updated 3 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 5 years ago
- Code injection from Linux kernel to a process☆24Updated 2 years ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆16Updated last year
- My CTF writeups☆27Updated 4 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆132Updated 3 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆40Updated 3 years ago
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆28Updated 4 years ago
- Files used for reproducing Fuzzware's experiments☆61Updated 2 years ago