bcoles / kasldLinks
Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address as an unprivileged local user, for the purpose of bypassing Kernel Address Space Layout Randomization (KASLR).
☆468Updated last year
Alternatives and similar repositories for kasld
Users that are interested in kasld are comparing it to the libraries listed below
Sorting:
- Kernel Fuzzer for Xen Project (KF/x) - Hypervisor-based fuzzing using Xen VM forking, VMI & AFL☆473Updated last year
- Kernel development & exploitation practice environment.☆250Updated 2 years ago
- Linux kernel exploitation experiments☆380Updated last week
- A fuzzer for full VM kernel/driver targets☆768Updated 3 weeks ago
- A blazing fast™ multithreaded ROP Gadget finder. ropper / ropgadget alternative (currently x86 only)☆541Updated 7 months ago
- ☆171Updated last year
- ☆189Updated 11 months ago
- ☆444Updated last year
- helps visualize heap operations for pwn and debugging☆329Updated 3 years ago
- repository for kernel exploit practice☆414Updated 6 years ago
- radius2 is a fast binary emulation and symbolic execution framework using radare2☆621Updated last year
- ROPium is a tool that helps you building ROP exploits by finding and chaining gadgets together☆389Updated 3 years ago
- Winnie makes fuzzing Windows applications easy☆570Updated 3 years ago
- ☆330Updated last year
- Use angr in Ghidra☆616Updated last year
- kernel-pwn and writeup collection☆692Updated 2 years ago
- This Repository aims at giving a basic idea about Kernel Exploitation.☆523Updated last year
- AFL binary instrumentation☆305Updated last year
- An educational Bochs-based snapshot fuzzer project☆226Updated 3 months ago
- A snapshotting, coverage-guided fuzzer for software (UEFI, Kernel, firmware, BIOS) built on SIMICS☆325Updated last week
- Vulnerability research notes for VirtualBox and QEMU. Contains debug environment setup notes, a PoC template, exploit primitive notes, an…☆198Updated last year
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆438Updated 9 months ago
- A plugin to introduce interactive symbols into your debugger from your decompiler☆770Updated 2 weeks ago
- The fastest Intel-PT decoder for fuzzing☆376Updated 2 years ago
- ☆188Updated 2 years ago
- GEF - GDB Enhanced Features - bata24's fork☆609Updated this week
- Windows Pwnable Study☆399Updated 7 months ago
- Split information output of pwndbg output☆215Updated last year
- A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.☆283Updated this week
- ☆263Updated 2 years ago