Notselwyn / kernel-scripts
A curated collection of scripts for kernel-related devops
☆13Updated last year
Alternatives and similar repositories for kernel-scripts
Users that are interested in kernel-scripts are comparing it to the libraries listed below
Sorting:
- Linux rootkit for educational purposes☆31Updated last year
- A Linux x86/x86-64 tool to trace registers and memory regions.☆37Updated 2 years ago
- weggli ruleset scanner for source code and binaries☆29Updated 4 months ago
- Browser exploitation v8 and sandbox escape challenges with solutions.☆27Updated 3 years ago
- Supporting Materials for “Symbolic Triage” blog post☆24Updated 2 years ago
- A repository teaching bss/data segment exploitation techniques.☆13Updated 5 years ago
- HN Security's advisories.☆22Updated 3 weeks ago
- A tool to inject C code into ELF64 binaries☆30Updated 3 years ago
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆13Updated 5 months ago
- iTLB multihit PoC☆40Updated last year
- Read out-of-bounds PoC for miniupnpd <= v2.1☆21Updated 6 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆52Updated last year
- LKRG bypass methods☆72Updated 5 years ago
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Updated 3 years ago
- Data graphing library for command line.☆15Updated 3 years ago
- Debugger and analyzer for ARM ELF executables.☆19Updated 2 years ago
- ☆14Updated 3 years ago
- Code injection from Linux kernel to a process☆21Updated last year
- TrustZone or TreacheryZone? Giving a vendor more trust increases their power to abuse us surreptitiously.☆14Updated 2 years ago
- A IDA plugin to enable linking to locations in an IDB with a disas:// URI☆32Updated last year
- 🔓 x86 Linux Kernel rootkit for Debian 9 (4.9.0-11-686-pae)☆34Updated 5 years ago
- Helper scripts for windows debugging with symbols for Bochs and IDA Pro (PDB files). Very handy for user mode <--> kernel mode☆19Updated last year
- Kernel Read Write Execute☆42Updated 3 months ago
- yet another hidden LKM hunter☆22Updated last year
- Find RSA primes in files☆20Updated 2 years ago
- ☆10Updated 8 years ago
- ☆11Updated 3 years ago
- Vagrant setup for building a machine for CTF/exploit development☆23Updated 6 years ago
- hypervisor enforced patch protection for the linux kernel with xen + libvmi, libvmi KASLR offset spoofer☆32Updated last year
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Updated 4 years ago