a13xp0p0v / linux-kernel-defence-mapLinks
Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and defence technologies
☆2,248Updated 11 months ago
Alternatives and similar repositories for linux-kernel-defence-map
Users that are interested in linux-kernel-defence-map are comparing it to the libraries listed below
Sorting:
- A tool for checking the security hardening options of the Linux kernel☆2,001Updated 2 weeks ago
- Fully dockerized Linux kernel debugging environment☆770Updated last year
- Tracking CVEs for the linux Kernel☆753Updated last year
- A collection of resources for linux reverse engineering☆2,061Updated 3 years ago
- Some helpful preload libraries for pwning stuff.☆1,636Updated 6 months ago
- weggli is a fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interestin…☆2,461Updated last year
- Programmable debugger☆1,943Updated this week
- Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read☆1,346Updated 9 months ago
- Linux Kernel Runtime Guard☆548Updated last month
- A collection of links related to Linux kernel security and exploitation☆6,244Updated last month
- Linux system call fuzzer☆895Updated 3 months ago
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆5,932Updated this week
- Checksec☆2,250Updated last week
- My proof-of-concept exploits for the Linux kernel☆1,536Updated 2 months ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,197Updated 6 months ago
- ☆1,505Updated 3 years ago
- A series of posts about QEMU internals:☆1,469Updated 2 years ago
- Security Research from the Microsoft Security Response Center (MSRC)☆1,373Updated last year
- ☆650Updated 8 months ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆920Updated last year
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,372Updated 10 months ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆2,069Updated 9 months ago
- A set of Linux binary exploitation tasks for beginners on various architectures☆542Updated 3 years ago
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆738Updated 3 months ago
- A collection of links related to VMware escape exploits☆1,478Updated last year
- awesome-linux-rootkits☆1,975Updated 10 months ago
- Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Stor…☆832Updated 11 months ago
- a "Proof of Concept or GTFO" mirror with an extensive index with also whole issues or individual articles as clean PDFs.☆1,515Updated last year
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆4,279Updated this week
- VirtualBox E1000 Guest-to-Host Escape☆1,416Updated 7 years ago