This is a proof of concept for CVE-2025-38352, a vulnerability in the Linux kernel's POSIX CPU timers implementation. The September 2025 Android Bulletin mentions that this vulnerability has been used in limited, targeted exploitation in the wild.
☆94Jan 5, 2026Updated 2 months ago
Alternatives and similar repositories for poc-CVE-2025-38352
Users that are interested in poc-CVE-2025-38352 are comparing it to the libraries listed below
Sorting:
- Android kernel exploit for CVE-2025-38352, previously exploited in-the-wild. Targets vulnerable x86_64 Linux kernels v5.10.x.☆278Jan 5, 2026Updated 2 months ago
- Accurate-Cyber-Box – Beta Version is an advanced cybersecurity readiness platform designed to strengthen defensive capabilities through c…☆28Dec 31, 2025Updated 2 months ago
- PolicyKit CVE-2021-3560 Exploitation (Authentication Agent)☆24Mar 6, 2023Updated 3 years ago
- ☆18Nov 7, 2024Updated last year
- A portfolio of web apps for the CodeCademy Mastering Generative AI & Agents for Developers Bootcamp (Aug-Sep 2025)☆19Jan 28, 2026Updated last month
- An advanced NFT launchpad starter kit using ERC721A for low-gas batch minting and Merkle Proofs for gas-efficient whitelist verification.☆21Jan 23, 2026Updated last month
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- A full stack blog application built with Next.js 15, MongoDB, and Tailwind CSS featuring frontend, backend, and admin panel. 📚☆13Aug 25, 2025Updated 6 months ago
- ☆57Oct 22, 2025Updated 4 months ago
- MacOS kernel memory leak (4 bytes)☆30Apr 14, 2020Updated 5 years ago
- ☆20Feb 11, 2026Updated 3 weeks ago
- Exploit code by DirtyChain☆12Apr 11, 2025Updated 10 months ago
- For V8CTF M122☆14Aug 25, 2024Updated last year
- REcon 2024 Repo, slides for talk "GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev""☆14Mar 31, 2025Updated 11 months ago
- **VaultEdge** is a secure, modular, and scalable backend system built with C#. It provides robust user authentication, encrypted vault st…☆34Nov 17, 2025Updated 3 months ago
- A kext to facilitate calling PE_enter_debugger on machines that don't respect Cmd-Ctrl-Opt-Shift-Esc☆15Aug 8, 2018Updated 7 years ago
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆37Apr 24, 2025Updated 10 months ago
- ☆11May 17, 2024Updated last year
- ☆34Apr 14, 2025Updated 10 months ago
- ☆127Nov 12, 2024Updated last year
- Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)☆281May 27, 2023Updated 2 years ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆31Dec 31, 2025Updated 2 months ago
- ☆32Updated this week
- gdb plugin for linux kernel to debug slub☆52May 11, 2020Updated 5 years ago
- Integer overflow in FreeType software, which also affects Chrome☆28Aug 27, 2025Updated 6 months ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- blazingly fast, universal and easy-to-use programming language for anything you can imagine☆21Jan 23, 2026Updated last month
- Writeup and exploit for CVE-2024-34740, integer overflow in Android's BinaryXmlSerializer to system_server file write and then to system_…☆53Oct 8, 2025Updated 5 months ago
- AI☆23Jun 9, 2025Updated 9 months ago
- ☆32Aug 10, 2020Updated 5 years ago
- Raw IDA Kernel API for IDAPython☆34Apr 10, 2022Updated 3 years ago
- Automated loop driver, slash commands, council automation, MCP browser bridge, and portfolio governance for Claude Code CLI☆55Updated this week
- my exp for CVE-2020-27194, tested on linux kernel 5.8.14.☆15Feb 3, 2021Updated 5 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- Self-hosted cybersecurity dashboard to organize learning resources, tools, news and certifications. A personal hub to centralize and mana…☆34Dec 10, 2025Updated 2 months ago
- javascript extension of windbg for hacker.☆18Jun 27, 2023Updated 2 years ago
- Binary Ninja plugin for forward/backward slicing☆18Nov 25, 2020Updated 5 years ago
- ☆23Aug 4, 2025Updated 7 months ago
- ☆31Feb 19, 2026Updated 2 weeks ago