Containers for building the Linux kernel or other software with many different compilers
☆262Mar 14, 2026Updated 2 weeks ago
Alternatives and similar repositories for kernel-build-containers
Users that are interested in kernel-build-containers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆190Feb 8, 2025Updated last year
- linux kernel cross page attack demo module☆32Mar 15, 2023Updated 3 years ago
- Linux kernel exploitation experiments☆390Updated this week
- GDB plug-in that helps exploiting the Linux kernel's SLUB allocator☆99Mar 29, 2023Updated 3 years ago
- SALT - SLUB ALlocator Tracer for the Linux kernel☆158Sep 10, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- An exploit primitive in linux kernel inspired by DirtyPipe☆101Apr 5, 2022Updated 3 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆2,262Dec 27, 2025Updated 3 months ago
- GEF - GDB Enhanced Features - bata24's fork☆634Mar 25, 2026Updated last week
- My personal blog about OS kernel development and security -- https://a13xp0p0v.github.io/☆12Mar 1, 2026Updated 3 weeks ago
- kernel-pwn and writeup collection☆707Oct 2, 2023Updated 2 years ago
- A tool for checking the security hardening options of the Linux kernel☆2,050Feb 28, 2026Updated last month
- Explore a live Linux kernel's memory using GDB☆118Oct 20, 2022Updated 3 years ago
- ☆227Dec 9, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- LKRG bypass methods☆74Jan 10, 2020Updated 6 years ago
- Fully dockerized Linux kernel debugging environment☆772Sep 23, 2024Updated last year
- Slides of mine.☆12Apr 19, 2024Updated last year
- A hacky tool for analysing linux kernel commits☆39Feb 7, 2023Updated 3 years ago
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆860Jun 4, 2020Updated 5 years ago
- ☆19Mar 7, 2026Updated 3 weeks ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,286Jan 29, 2026Updated 2 months ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆107Jan 13, 2026Updated 2 months ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆922May 20, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A tool to recover a fully analyzable .ELF from a raw kernel, through extracting the kernel symbol table (kallsyms)☆1,706Updated this week
- python exp of pwnable' problems☆18Feb 5, 2024Updated 2 years ago
- ☆20Jun 7, 2025Updated 9 months ago
- Exploit for CVE-2022-27666☆205Mar 28, 2022Updated 4 years ago
- A collection of links related to Linux kernel security and exploitation☆6,391Mar 7, 2026Updated 3 weeks ago
- ☆46Jan 23, 2022Updated 4 years ago
- Kernel exploitation technique☆588Nov 10, 2023Updated 2 years ago
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆201Mar 14, 2024Updated 2 years ago
- Go语言,不允许import,请开始你的表演☆62Aug 6, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- ☆40Feb 3, 2026Updated last month
- ☆176May 2, 2019Updated 6 years ago
- CVE-2022-25636 exploit rewritten with pipe primitive☆20Apr 5, 2022Updated 3 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago
- ☆48Nov 15, 2021Updated 4 years ago
- Linux kernel source tree☆18Mar 11, 2026Updated 2 weeks ago