Hacking the Linux kernel
☆15Jun 17, 2023Updated 2 years ago
Alternatives and similar repositories for linux_kernel_hacking
Users that are interested in linux_kernel_hacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 🚩 framework for kernel memory exploitation (WIP)☆22Jul 22, 2025Updated 8 months ago
- 福昕Foxit PDF远程代码执行漏洞CVE-2023-27363分析与复现☆11Jul 6, 2023Updated 2 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Nov 4, 2022Updated 3 years ago
- linux ebpf backdoor demo☆12Nov 20, 2024Updated last year
- Add debugging tools to an existing initramfs, even if it is for a foreign architecture☆24Aug 28, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- An Multiboot Compliant X64 SMP Operating Systems☆13Oct 17, 2013Updated 12 years ago
- CVE-2022-3910☆13Mar 14, 2023Updated 3 years ago
- ebpf covert channel rootkit☆15Feb 6, 2024Updated 2 years ago
- Slides for presentations held at conferences☆48Jan 2, 2023Updated 3 years ago
- 要是不做开源的话,我可能早就财务自由了吧?😅☆19Dec 20, 2021Updated 4 years ago
- Docker image for RISC-V 32/64 development environment, along with Qemu☆25Jul 3, 2022Updated 3 years ago
- The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947☆19Jul 2, 2020Updated 5 years ago
- Quarantine bypass and RCE vulnerability in Sketch (proof-of-concept)☆13Nov 22, 2021Updated 4 years ago
- CVE-2021-3707 , CVE-2021-3708☆21Jan 21, 2022Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- exploit for dirtycow☆14Dec 21, 2022Updated 3 years ago
- ☆17Jun 30, 2023Updated 2 years ago
- blog☆17Apr 27, 2020Updated 5 years ago
- 调用Windows Api,绕过杀软添加用户☆37Oct 8, 2020Updated 5 years ago
- ☆58Nov 28, 2023Updated 2 years ago
- ☆13Aug 22, 2022Updated 3 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- 4.9 Kernel Exploit for CVE-2020-27786☆10Dec 3, 2022Updated 3 years ago
- Cobalt Strike 的 CVE-2024-35250 的 BOF。(请给我加个星,谢谢。)☆14Oct 21, 2024Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A CTF fuzz powerd by protobuf.☆15May 24, 2022Updated 3 years ago
- A few resources for fuzzing☆17Sep 25, 2022Updated 3 years ago
- ☆14Nov 5, 2020Updated 5 years ago
- ☆21Jul 27, 2020Updated 5 years ago
- Personal pwning toolset developed/used by myself. Use at your own risk.☆18Sep 26, 2022Updated 3 years ago
- Lightdash文件读取漏洞(CVE-2023-35844)☆20Jun 26, 2023Updated 2 years ago
- ☆30Sep 6, 2022Updated 3 years ago
- This plugin serves as a bridge between Binary Ninja and Ghidra's disassembler.☆36Jun 27, 2022Updated 3 years ago
- pwntools library implementation in c++☆49Apr 11, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Use openai to help you better translate function meanings and restore symbol tables from sub_xxxx functions☆19Jul 1, 2024Updated last year
- ☆13Aug 2, 2020Updated 5 years ago
- CVE-2019-2729 Exploit Script☆46Feb 19, 2020Updated 6 years ago
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆26Dec 20, 2023Updated 2 years ago
- CVE-2022-0185 exploit rewritten with pipe primitive☆17Apr 5, 2022Updated 4 years ago
- The best vulnerable driver to learn how to exploit kernel vulnerability.☆34Oct 16, 2019Updated 6 years ago
- VM escape (QEMU, VirtualBox, VMware)☆17Mar 21, 2022Updated 4 years ago