farazsth98 / poc-CVE-2025-38352View external linksLinks
This is a proof of concept for CVE-2025-38352, a vulnerability in the Linux kernel's POSIX CPU timers implementation. The September 2025 Android Bulletin mentions that this vulnerability has been used in limited, targeted exploitation in the wild.
☆90Jan 5, 2026Updated last month
Alternatives and similar repositories for poc-CVE-2025-38352
Users that are interested in poc-CVE-2025-38352 are comparing it to the libraries listed below
Sorting:
- PolicyKit CVE-2021-3560 Exploitation (Authentication Agent)☆24Mar 6, 2023Updated 2 years ago
- ☆18Nov 7, 2024Updated last year
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- An advanced NFT launchpad starter kit using ERC721A for low-gas batch minting and Merkle Proofs for gas-efficient whitelist verification.☆21Jan 23, 2026Updated 3 weeks ago
- A portfolio of web apps for the CodeCademy Mastering Generative AI & Agents for Developers Bootcamp (Aug-Sep 2025)☆18Jan 28, 2026Updated 2 weeks ago
- A full stack blog application built with Next.js 15, MongoDB, and Tailwind CSS featuring frontend, backend, and admin panel. 📚☆13Aug 25, 2025Updated 5 months ago
- Android kernel exploit for CVE-2025-38352, previously exploited in-the-wild. Targets vulnerable x86_64 Linux kernels v5.10.x.☆271Jan 5, 2026Updated last month
- ☆57Oct 22, 2025Updated 3 months ago
- MacOS kernel memory leak (4 bytes)☆30Apr 14, 2020Updated 5 years ago
- ☆20Updated this week
- Exploit code by DirtyChain☆11Apr 11, 2025Updated 10 months ago
- REcon 2024 Repo, slides for talk "GOP Complex: Image parsing bugs, EBC polymorphic engines and the Deus ex machina of UEFI exploit dev""☆14Mar 31, 2025Updated 10 months ago
- For V8CTF M122☆14Aug 25, 2024Updated last year
- A kext to facilitate calling PE_enter_debugger on machines that don't respect Cmd-Ctrl-Opt-Shift-Esc☆15Aug 8, 2018Updated 7 years ago
- **VaultEdge** is a secure, modular, and scalable backend system built with C#. It provides robust user authentication, encrypted vault st…☆33Nov 17, 2025Updated 3 months ago
- ☆34Apr 14, 2025Updated 10 months ago
- Check if your AV/EDR does inline hooking, displays the hooked functions and allows you to compare them with the original ones.☆36Apr 24, 2025Updated 9 months ago
- ☆11May 17, 2024Updated last year
- ☆130Nov 12, 2024Updated last year
- Writeup and exploit for CVE-2024-34740, integer overflow in Android's BinaryXmlSerializer to system_server file write and then to system_…☆51Oct 8, 2025Updated 4 months ago
- gdb plugin for linux kernel to debug slub☆52May 11, 2020Updated 5 years ago
- Integer overflow in FreeType software, which also affects Chrome☆23Aug 27, 2025Updated 5 months ago
- AI☆23Jun 9, 2025Updated 8 months ago
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- blazingly fast, universal and easy-to-use programming language for anything you can imagine☆21Jan 23, 2026Updated 3 weeks ago
- ☆32Aug 10, 2020Updated 5 years ago
- Raw IDA Kernel API for IDAPython☆34Apr 10, 2022Updated 3 years ago
- ☆31Updated this week
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- The PoC of CVE-2025-70795 / CVE-2026-0828 and its update☆30Updated this week
- ☆22Aug 4, 2025Updated 6 months ago
- my exp for CVE-2020-27194, tested on linux kernel 5.8.14.☆15Feb 3, 2021Updated 5 years ago
- javascript extension of windbg for hacker.☆18Jun 27, 2023Updated 2 years ago
- Binary Ninja plugin for forward/backward slicing☆18Nov 25, 2020Updated 5 years ago
- A in-the-wild V8 type confusion bug.☆29Aug 8, 2025Updated 6 months ago
- PoC of CVE-2022-20474☆19Feb 3, 2025Updated last year
- ☆15Feb 5, 2025Updated last year
- CVE-2025-21479 proof-of-concept, I think☆197Aug 16, 2025Updated 6 months ago
- Accurate-Cyber-Box – Beta Version is an advanced cybersecurity readiness platform designed to strengthen defensive capabilities through c…☆26Dec 31, 2025Updated last month