SeanPesce / SELinux-Kernel-Module-BypassLinks
Tools to bypass flawed SELinux policies using the init_module system call
☆54Updated last year
Alternatives and similar repositories for SELinux-Kernel-Module-Bypass
Users that are interested in SELinux-Kernel-Module-Bypass are comparing it to the libraries listed below
Sorting:
- Kernel Read Write Execute☆84Updated 9 months ago
- ☆15Updated last year
- ☆34Updated last year
- A script to detect stack-strings by using emulation (leveraging Unicorn)☆35Updated last year
- Proof of concept code for CVE-2023-2008☆40Updated last year
- Repo with different exploits & PoCs☆64Updated 2 weeks ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- poc code for CVE-2024-38080☆30Updated 9 months ago
- Analysis of the vulnerability☆51Updated last year
- The Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples.☆61Updated last year
- LPE exploit for CVE-2024-0582 (io_uring)☆100Updated last year
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆61Updated 6 months ago
- ☆46Updated 2 months ago
- Proof-of-concept code for Android APEX key reuse vulnerability☆93Updated last year
- LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.☆91Updated last year
- Linux Kernel N-day Exploit/Analysis.☆65Updated 7 months ago
- ☆33Updated last year
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆51Updated 2 years ago
- Attacking the cleanup_module function of a kernel module☆34Updated 2 months ago
- ☆32Updated 4 months ago
- ☆35Updated last year
- javascript extension of windbg for hacker.☆15Updated last year
- A few examples of how to trap virtual memory access on Windows.☆30Updated 5 months ago
- A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that …☆59Updated 2 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆66Updated last year
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆18Updated 2 months ago
- Proof-of-Concept for CVE-2024-21345☆74Updated last year
- Proof-of-Concept for CVE-2024-26218☆51Updated last year
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆28Updated last month
- ☆60Updated last year