☆38Nov 30, 2020Updated 5 years ago
Alternatives and similar repositories for SLAKE
Users that are interested in SLAKE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerability☆62Sep 4, 2019Updated 6 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91May 7, 2024Updated last year
- ☆26May 10, 2021Updated 4 years ago
- K-Miner☆75Jun 5, 2019Updated 6 years ago
- ☆12Apr 23, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆14Oct 11, 2017Updated 8 years ago
- Source code for paper 'Automatic Heap Layout Manipulation for Exploitation'☆103Nov 24, 2019Updated 6 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆33Apr 6, 2022Updated 3 years ago
- ☆81Sep 7, 2023Updated 2 years ago
- LRSan: Detecting Lacking-Recheck Bugs in OS Kernels☆30Feb 23, 2019Updated 7 years ago
- Detect missing check bugs in OS kernels☆113Sep 23, 2023Updated 2 years ago
- some kernel exploit challenges and cve analysis☆26Nov 30, 2018Updated 7 years ago
- GDB plug-in that helps exploiting the Linux kernel's SLUB allocator☆99Mar 29, 2023Updated 2 years ago
- Collection of syzkaller bug reproducers for Linux☆44May 16, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Papers related with kernel papers☆13Mar 18, 2023Updated 3 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- Anderson points-to analysis implementation based on LLVM☆12Jan 3, 2021Updated 5 years ago
- Syzkaller with MAB scheduling and seed selection☆27Jan 29, 2020Updated 6 years ago
- ArcHeap: Automatic Techniques to Systematically Discover New Heap Exploitation Primitives☆158Mar 3, 2021Updated 5 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆92May 12, 2022Updated 3 years ago
- Code Repository for DataGuard Framework☆13Jul 11, 2023Updated 2 years ago
- ☆13Oct 17, 2021Updated 4 years ago
- Repo for FUZE project. I will also publish some Linux kernel LPE exploits for various real world kernel vulnerabilities here. the samples…☆504Sep 7, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Block Oriented Programming -- Compiler☆188Nov 5, 2020Updated 5 years ago
- RCE through Leakless HeapFengShui, fastbin alloc anywhere.☆82Dec 11, 2018Updated 7 years ago
- ☆46Jan 23, 2022Updated 4 years ago
- First level taint implementation with qemu for linux user mode☆28Aug 11, 2020Updated 5 years ago
- ☆70Mar 27, 2019Updated 6 years ago
- ☆37Nov 16, 2023Updated 2 years ago
- Sample code for ret2usr (and ret2dir) kernel attacks☆10Nov 23, 2016Updated 9 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Code of ISSTA'22: PrIntFuzz: Fuzzing Linux Drivers via Automated Virtual Device Simulation☆63Dec 2, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A collection of user-space Linux kernel specific guided fuzzers based on LKL☆84Jun 15, 2025Updated 9 months ago
- A list of data-only attacks☆21Aug 22, 2025Updated 7 months ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- DBGBench Website:☆19Feb 24, 2021Updated 5 years ago
- ☆15May 26, 2021Updated 4 years ago
- Official repository of SyzRisk [ASIA CCS'24]☆12Aug 20, 2024Updated last year
- ☆19Dec 9, 2022Updated 3 years ago