Tools to bypass flawed SELinux policies using the init_module system call
☆59Nov 20, 2023Updated 2 years ago
Alternatives and similar repositories for SELinux-Kernel-Module-Bypass
Users that are interested in SELinux-Kernel-Module-Bypass are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- ☆13Dec 29, 2022Updated 3 years ago
- ☆25Nov 28, 2022Updated 3 years ago
- A simple code to decrypt global-metadata.dat for Mobile Legends: Bang Bang☆14Jul 4, 2022Updated 3 years ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆469Apr 13, 2024Updated last year
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- A ring0 Loadable Kernel Module (Linux) for latest kernels 6.x☆103Dec 16, 2025Updated 3 months ago
- Kernel Read Write Execute☆84Aug 30, 2024Updated last year
- ☆22Sep 17, 2019Updated 6 years ago
- ☆70Jul 6, 2023Updated 2 years ago
- Kernel Read Write Execute☆46Jan 13, 2025Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- Linux Sleep Obfuscation☆112Jan 7, 2024Updated 2 years ago
- Custom Magisk Module that combines various other modules, such as Movecert and Frida☆25Mar 10, 2026Updated last week
- ☆17Jun 28, 2023Updated 2 years ago
- ☆39May 20, 2023Updated 2 years ago
- ☆112Dec 31, 2024Updated last year
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- Combine Dobby and QBDI☆29Jan 8, 2024Updated 2 years ago
- ☆73Feb 28, 2024Updated 2 years ago
- linux kernel cross page attack demo module☆32Mar 15, 2023Updated 3 years ago
- ☆39Jan 10, 2025Updated last year
- Using fibers to run in-memory code.☆243Oct 19, 2023Updated 2 years ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 8 months ago
- Android Kernel Exploitation☆642Feb 13, 2022Updated 4 years ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆115Mar 27, 2024Updated last year
- Linux #rootkit and #malware revealer☆31Aug 1, 2024Updated last year
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- A cross-platform C++ framework for building Windows shellcode☆163Mar 4, 2026Updated 2 weeks ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Oct 16, 2019Updated 6 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- dump Chrome cookies remotely with atexec and CDP☆69Aug 10, 2024Updated last year
- Rust For Windows Cheatsheet☆121Nov 26, 2025Updated 3 months ago
- A collection of my weggli patterns to facilitate vulnerability research.☆155Mar 9, 2026Updated 2 weeks ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆42Oct 30, 2022Updated 3 years ago
- this is dump Il2Cpp CS Struct and IDA Script without global-metadta.dat in Runtime☆35Jul 29, 2022Updated 3 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- android8 arm64 注入方案☆37Jul 11, 2021Updated 4 years ago