Tools to bypass flawed SELinux policies using the init_module system call
☆58Nov 20, 2023Updated 2 years ago
Alternatives and similar repositories for SELinux-Kernel-Module-Bypass
Users that are interested in SELinux-Kernel-Module-Bypass are comparing it to the libraries listed below
Sorting:
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- ☆25Nov 28, 2022Updated 3 years ago
- ☆13Dec 29, 2022Updated 3 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆469Apr 13, 2024Updated last year
- Just some random stuff for AppLocker☆18Jan 30, 2019Updated 7 years ago
- ☆39May 20, 2023Updated 2 years ago
- Kernel Read Write Execute☆84Aug 30, 2024Updated last year
- the Open Source and Pure C++ Packer for eXecutables☆21Mar 25, 2023Updated 2 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- A simple code to decrypt global-metadata.dat for Mobile Legends: Bang Bang☆14Jul 4, 2022Updated 3 years ago
- Kernel Read Write Execute☆46Jan 13, 2025Updated last year
- A collection of my weggli patterns to facilitate vulnerability research.☆155Jan 14, 2026Updated last month
- Custom Magisk Module that combines various other modules, such as Movecert and Frida☆24Jan 29, 2026Updated last month
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- CVE-2021-4154 exploit☆67Oct 7, 2022Updated 3 years ago
- Linux Sleep Obfuscation☆112Jan 7, 2024Updated 2 years ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆96Mar 21, 2023Updated 2 years ago
- C# implementation of Out-Minidump.ps1☆10Jul 13, 2018Updated 7 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 7 months ago
- ☆12Jun 22, 2022Updated 3 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- Using fibers to run in-memory code.☆242Oct 19, 2023Updated 2 years ago
- A RunAs clone with the ability to specify the password as an argument.☆112Jul 2, 2023Updated 2 years ago
- ☆70Jul 6, 2023Updated 2 years ago
- Exploits for CVE-2023-27327 and CVE-2023-27328☆14May 9, 2023Updated 2 years ago
- Implementation trade-offs in using Intel Pin for instruction tracing of complex programs☆15Oct 16, 2019Updated 6 years ago
- Entra ID Password Protection Banned Password Lists☆17Apr 16, 2024Updated last year
- PoC code of AOT poisoning presented at Black Hat Asia 2023☆12May 10, 2023Updated 2 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 3 years ago
- Certipy in Docker☆13Mar 28, 2024Updated last year
- ☆15May 23, 2019Updated 6 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- A cross-platform C++ framework for building Windows shellcode☆158Updated this week
- Arxiv + Notion Sync☆20May 12, 2025Updated 9 months ago