bsauce / kernel-exploit-factory
Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your environment anymore.
☆1,154Updated last month
Related projects: ⓘ
- Anything about kernel security. CTF kernel pwn, kernel exploit, kernel fuzz and kernel defense paper, kernel debugging technique, kernel…☆624Updated 3 weeks ago
- Various kernel exploits☆732Updated 6 months ago
- A collection of links related to VMware escape exploits☆1,354Updated 2 weeks ago
- A script to automatically install Peda+pwndbg+GEF plugins for gdb☆385Updated last year
- kernel-pwn and writeup collection☆550Updated 11 months ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,751Updated 5 months ago
- Linux Kernel Hacking☆614Updated 5 months ago
- Provide powerful tools for seccomp analysis☆962Updated last week
- A Collection of Chrome Sandbox Escape POCs/Exploits for learning☆787Updated 4 years ago
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆790Updated last year
- Towards Large-Scale Emulation of IoT Firmware for Dynamic Analysis☆636Updated 2 months ago
- Tracking CVEs for the linux Kernel☆738Updated 5 months ago
- My proof-of-concept exploits for the Linux kernel☆1,441Updated 2 years ago
- An step by step fuzzing tutorial. A GitHub Security Lab initiative☆2,431Updated 3 months ago
- Linux kernel rootkit☆247Updated 3 weeks ago
- BinAbsInspector: Vulnerability Scanner for Binaries☆1,560Updated 3 months ago
- Build a database of libc offsets to simplify exploitation☆1,680Updated last year
- A docker environment for pwn in ctf☆731Updated 10 months ago
- Sudo Baron Samedit Exploit☆731Updated 2 years ago
- CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation☆557Updated 2 years ago
- share some useful archives about vm and qemu escape exploit.☆496Updated 5 months ago
- Repository for information about 0-days exploited in-the-wild.☆752Updated 3 weeks ago
- gdb for pwn☆884Updated last month
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,106Updated last year
- CVE-2023-3269: Linux kernel privilege escalation vulnerability☆461Updated last year
- A set of Linux binary exploitation tasks for beginners on various architectures☆516Updated 2 years ago
- awesome-linux-rootkits☆1,677Updated last year
- For Linux binary Exploitation☆812Updated 6 years ago
- IDA Pro plugin for query based searching within the binary useful mainly for vulnerability research.☆520Updated last month
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆1,839Updated last month