☆103Mar 8, 2022Updated 4 years ago
Alternatives and similar repositories for Linux_LPE_io_uring_CVE-2021-41073
Users that are interested in Linux_LPE_io_uring_CVE-2021-41073 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- ☆312Jul 10, 2023Updated 2 years ago
- exploit code for a bpf heap overflow vulnerability☆28Sep 3, 2019Updated 6 years ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆43Aug 3, 2021Updated 4 years ago
- ☆177Jun 18, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆21Jul 27, 2020Updated 5 years ago
- My-CTF-Challenges☆15Sep 27, 2021Updated 4 years ago
- CVE-2022-34918 netfilter nf_tables 本地提权 POC☆220Sep 15, 2022Updated 3 years ago
- 4.9 Kernel Exploit for CVE-2020-27786☆10Dec 3, 2022Updated 3 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆101Apr 5, 2022Updated 3 years ago
- I will provide details and pocs for some bugs I found.☆41Apr 15, 2024Updated last year
- CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation☆579Jun 7, 2022Updated 3 years ago
- Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang☆20Aug 9, 2022Updated 3 years ago
- dc2020 quals kernel pwn☆12May 18, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆11Oct 16, 2021Updated 4 years ago
- CVE-2022-0185☆378Apr 25, 2022Updated 3 years ago
- Exploit for CVE-2022-27666☆205Mar 28, 2022Updated 4 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Nov 4, 2022Updated 3 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215☆66Sep 4, 2022Updated 3 years ago
- ☆31Feb 20, 2022Updated 4 years ago
- python exp of pwnable' problems☆18Feb 5, 2024Updated 2 years ago
- CTF Write-ups☆29Apr 20, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- attachment and write up for D^3CTF 2023's pwn challenge - d3kcache☆42Jun 28, 2024Updated last year
- CVE-2022-24122 Proof of Concept☆13Mar 15, 2022Updated 4 years ago
- Local privilege escalation PoC for Linux kernel CVE-2022-1015☆206Apr 3, 2022Updated 3 years ago
- kernel-pwn and writeup collection☆707Oct 2, 2023Updated 2 years ago
- Binary Ninja plugin & workflow to help analyze Objective-C code☆84Jul 11, 2022Updated 3 years ago
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- Dice CTF 2022 breach write-up☆15Feb 14, 2022Updated 4 years ago
- ☆137Dec 5, 2025Updated 3 months ago
- ☆12Sep 8, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- CVE-2022-0185 exploit rewritten with pipe primitive☆17Apr 5, 2022Updated 3 years ago
- Fuzzer for Linux Kernel Drivers☆384Apr 30, 2022Updated 3 years ago
- Android kernel exploitation for CVE-2022-20409☆207Oct 17, 2024Updated last year
- CVE-2022-0995 exploit☆500Mar 27, 2022Updated 4 years ago
- ☆26May 10, 2021Updated 4 years ago
- A data-flow-guided fuzzer☆124Aug 19, 2023Updated 2 years ago
- A IDA plugin to show ARM MSRs nicely☆86Jan 4, 2023Updated 3 years ago