Tools to bypass flawed SELinux policies using the init_module system call
☆59Nov 20, 2023Updated 2 years ago
Alternatives and similar repositories for SELinux-Kernel-Module-Bypass
Users that are interested in SELinux-Kernel-Module-Bypass are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- ☆13Dec 29, 2022Updated 3 years ago
- ☆25Nov 28, 2022Updated 3 years ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆472Apr 6, 2026Updated last week
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A ring0 Loadable Kernel Module (Linux) for latest kernels 6.x☆105Dec 16, 2025Updated 3 months ago
- Kernel Read Write Execute☆83Aug 30, 2024Updated last year
- ☆22Sep 17, 2019Updated 6 years ago
- ☆70Jul 6, 2023Updated 2 years ago
- Kernel Read Write Execute☆46Jan 13, 2025Updated last year
- ☆63Updated this week
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 3 years ago
- Linux Sleep Obfuscation☆114Jan 7, 2024Updated 2 years ago
- Custom Magisk Module that combines various other modules, such as Movecert and Frida☆27Mar 10, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆17Jun 28, 2023Updated 2 years ago
- ☆39May 20, 2023Updated 2 years ago
- ☆113Dec 31, 2024Updated last year
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- Combine Dobby and QBDI☆30Jan 8, 2024Updated 2 years ago
- ☆73Feb 28, 2024Updated 2 years ago
- linux kernel cross page attack demo module☆32Mar 15, 2023Updated 3 years ago
- ☆39Jan 10, 2025Updated last year
- Using fibers to run in-memory code.☆243Oct 19, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆29Jul 21, 2025Updated 8 months ago
- Android Kernel Exploitation☆643Feb 13, 2022Updated 4 years ago
- Linux #rootkit and #malware revealer☆31Aug 1, 2024Updated last year
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Oct 16, 2019Updated 6 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- dump Chrome cookies remotely with atexec and CDP☆67Aug 10, 2024Updated last year
- Rust For Windows Cheatsheet☆121Nov 26, 2025Updated 4 months ago
- A collection of my weggli patterns to facilitate vulnerability research.☆155Apr 3, 2026Updated last week
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- this is dump Il2Cpp CS Struct and IDA Script without global-metadta.dat in Runtime☆35Jul 29, 2022Updated 3 years ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Oct 30, 2022Updated 3 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- android8 arm64 注入方案☆38Jul 11, 2021Updated 4 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- An evil bit backdoor for iptables☆55Apr 14, 2021Updated 5 years ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆133Apr 13, 2025Updated last year