SeanPesce / SELinux-Kernel-Module-BypassLinks
Tools to bypass flawed SELinux policies using the init_module system call
☆59Updated 2 years ago
Alternatives and similar repositories for SELinux-Kernel-Module-Bypass
Users that are interested in SELinux-Kernel-Module-Bypass are comparing it to the libraries listed below
Sorting:
- Kernel Read Write Execute☆82Updated last year
- The Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples.☆64Updated last year
- LPE exploit for CVE-2024-0582 (io_uring)☆101Updated last year
- ☆15Updated 2 years ago
- Analysis of the vulnerability☆49Updated last year
- ☆37Updated last year
- A headless, extendable, multi-session, IDA Pro MCP framework.☆84Updated 2 months ago
- Repo with different exploits & PoCs☆65Updated 6 months ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Updated last year
- This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.☆49Updated last year
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆65Updated last year
- BlackHat Asia 2025 code and presentations☆18Updated 7 months ago
- Report and exploit of CVE-2023-36427☆89Updated 2 years ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆62Updated 2 years ago
- A in-the-wild V8 type confusion bug.☆28Updated 4 months ago
- Rerousces related to time-travel debugging (TTD)☆24Updated 3 weeks ago
- ☆38Updated last year
- Proof of concept code for CVE-2023-2008☆40Updated 2 years ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆70Updated last year
- LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.☆92Updated 2 years ago
- poc code for CVE-2024-38080☆29Updated last year
- pocs & exploit for CVE-2023-24871 (rce + lpe)☆50Updated last year
- javascript extension of windbg for hacker.☆17Updated 2 years ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆43Updated 11 months ago
- Proof-of-Concept for CVE-2024-26218☆54Updated last year
- ☆24Updated last year
- ☆32Updated 2 years ago
- IDA Python deobfuscation script for ConfuserEx binaries☆35Updated 3 years ago
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆29Updated last month
- Proof-of-Concept for CVE-2024-21345☆76Updated last year