chompie1337 / Linux_LPE_io_uring_CVE-2021-41073Links
☆100Updated 3 years ago
Alternatives and similar repositories for Linux_LPE_io_uring_CVE-2021-41073
Users that are interested in Linux_LPE_io_uring_CVE-2021-41073 are comparing it to the libraries listed below
Sorting:
- Simple script to find kernel objects of a certain size in the Linux kernel☆110Updated 2 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Updated 3 years ago
- Linux Kernel N-day Exploit/Analysis.☆67Updated 11 months ago
- ☆98Updated 2 years ago
- Binary exploitation by confusing the unwinder☆65Updated 2 years ago
- ☆71Updated 2 years ago
- A hacky tool for analysing linux kernel commits☆37Updated 2 years ago
- Use-After-Free in Netfilter nf_tables when processing batch requests CVE-2023-32233☆51Updated 2 years ago
- ☆120Updated last month
- ☆66Updated 2 years ago
- 0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020/2021 CVE-2021-2119☆144Updated 4 years ago
- ☆129Updated 10 months ago
- PoC of fuzzing closed-source userspace binaries with KVM☆165Updated last year
- harness for fuzzing with winafl. both public and my own which i have released.☆58Updated 4 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago
- ☆60Updated last year
- ☆33Updated 9 months ago
- Kernel Read Write Execute☆83Updated last year
- ☆145Updated 3 years ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆97Updated 3 years ago
- Slides and Material for "SymbolicExecutionDemystified" Presentation @ Insomni'Hack 2022☆100Updated 3 years ago
- ☆82Updated 2 years ago
- CVE-2022-2586: Linux kernel nft_object UAF☆16Updated 3 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Updated 7 months ago
- Old and new CTFs about Linux kernel exploitation.☆59Updated 3 years ago
- ☆67Updated 3 years ago
- Select Bugs From Binary Where Pattern Like CVE-1337-Days☆50Updated 2 years ago
- ☆19Updated 3 years ago
- Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router fo…☆129Updated 3 years ago
- Research related☆89Updated 3 years ago