SeanPesce / SELinux-Kernel-Module-BypassLinks
Tools to bypass flawed SELinux policies using the init_module system call
☆58Updated last year
Alternatives and similar repositories for SELinux-Kernel-Module-Bypass
Users that are interested in SELinux-Kernel-Module-Bypass are comparing it to the libraries listed below
Sorting:
- Kernel Read Write Execute☆85Updated last year
- ☆36Updated last year
- LPE exploit for CVE-2024-0582 (io_uring)☆101Updated last year
- The Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples.☆64Updated last year
- This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.☆49Updated last year
- ☆15Updated 2 years ago
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆62Updated 9 months ago
- CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK)☆45Updated 11 months ago
- Analysis of the vulnerability☆51Updated last year
- BlackHat Asia 2025 code and presentations☆18Updated 5 months ago
- Linux kernel LPE practice with an NPD vulnerability☆36Updated 2 years ago
- LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.☆92Updated last year
- Repo with different exploits & PoCs☆64Updated 4 months ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆42Updated 8 months ago
- DiffRays is a research-oriented tool for binary patch diffing, designed to aid in vulnerability research, exploit development, and revers…☆137Updated last week
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆61Updated 2 years ago
- Plugin interface for remote communications with Binary Ninja database and MCP server for interfacing with LLMs.☆43Updated 3 months ago
- Shielder's public proof of concepts collection☆33Updated last month
- ☆73Updated 10 months ago
- ☆26Updated 10 months ago
- ☆37Updated last year
- javascript extension of windbg for hacker.☆15Updated 2 years ago
- A simple but useful project maybe help you reverse Windows.☆39Updated last year
- IDA Python deobfuscation script for ConfuserEx binaries☆35Updated 3 years ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Updated last year
- Proof of concept code for CVE-2023-2008☆41Updated 2 years ago
- ELF static analysis and injection framework that parse, manipulate, patch and camouflage ELF files.☆116Updated 2 months ago
- ☆81Updated last year
- Proof-of-Concept for CVE-2024-26218☆54Updated last year