☆59Updated this week
Alternatives and similar repositories for kernel-research
Users that are interested in kernel-research are comparing it to the libraries listed below
Sorting:
- go-ima is a tool that checks if a file has been tampered with. It is useful in ensuring integrity in CI systems☆13Sep 28, 2023Updated 2 years ago
- Deterministic record and replay and tracing of syzkaller bug reproducers☆20Apr 25, 2025Updated 10 months ago
- ☆17Aug 25, 2022Updated 3 years ago
- [ISSTA 2025] Unlocking Low Frequency Syscalls in Kernel Fuzzing with Dependency-Based RAG☆52Jan 29, 2026Updated last month
- ☆28Nov 30, 2024Updated last year
- Domain specific language (DSL) and system for specifying, programming, and reasoning about packet-switched networks☆30Dec 19, 2025Updated 2 months ago
- 🚩 framework for kernel memory exploitation (WIP)☆22Jul 22, 2025Updated 7 months ago
- This upload contains the artifacts for the paper "SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon", to appear…☆22Jan 26, 2025Updated last year
- OCaml hacking ideas, small and large.☆20Apr 9, 2024Updated last year
- Proof-of-concept code for the IEEE S&P 2025 paper "Peek-a-Walk: Leaking Secrets via Page Walk Side Channels"☆32Jul 2, 2025Updated 7 months ago
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆25Sep 5, 2021Updated 4 years ago
- My browser pwn collections. Mainly JavaScript engine stuff.☆33Jan 27, 2025Updated last year
- 🦖 Reconstruct Types from Binary Code☆45Nov 21, 2025Updated 3 months ago
- kdevops main repository: Generalized devops infrastructure for Linux kernel development☆32Jan 8, 2026Updated last month
- ☆39Jul 25, 2025Updated 7 months ago
- ☆16Sep 22, 2014Updated 11 years ago
- Chrome V8 CVE exploits and proof-of-concept scripts written by me, for educational and research purposes only.☆92Aug 25, 2024Updated last year
- Research browsers☆48Jan 9, 2026Updated last month
- A simple C++ Windows tool to get information about processes exposing named pipes.☆40Mar 6, 2025Updated 11 months ago
- Linux kernel privilege escalation techniques☆152Aug 9, 2024Updated last year
- ☆41May 7, 2024Updated last year
- CVE Exploit PoC's☆34Sep 3, 2023Updated 2 years ago
- ☆56Jan 30, 2026Updated last month
- Plugin for autocomplete using trix editor☆17Aug 18, 2017Updated 8 years ago
- This is an implementation of SafeBricks, based on NetBricks maintained by Comcast and refined by Yang: https://github.com/YangZhou1997/Ne…☆10Feb 3, 2020Updated 6 years ago
- CAMP: Compiler and Allocator-based Heap Memory Protection (USENIX Security 2024) ✨☆45Jul 18, 2024Updated last year
- Module for Linux PAM stack to authenticate users against privacyIDEA☆7Jun 12, 2025Updated 8 months ago
- ☆12Jul 10, 2023Updated 2 years ago
- Modular pipeline based on the KernelCI API☆11Updated this week
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆106Jan 13, 2026Updated last month
- Toolkit to turn Chromium vulnerabilities into full-chain exploits☆271Sep 16, 2025Updated 5 months ago
- the rounding error tool 🚩☆14May 16, 2025Updated 9 months ago
- An API that encodes data privacy and protection laws from around the world and returns risk and compliance assessments☆11Jul 3, 2017Updated 8 years ago
- Scudo useful files☆10Jul 3, 2022Updated 3 years ago
- 0day-today-archive: Historical collection of exploits and vulnerabilities from 0day.today☆34Sep 22, 2025Updated 5 months ago
- Linux hardware support for the Chuwi Minibook X convertible laptop - provides accelerometer-based tablet mode detection with desktop envi…☆29Nov 17, 2025Updated 3 months ago
- ☆12Jan 28, 2026Updated last month
- ☆12Apr 1, 2025Updated 10 months ago
- Simple password db☆23Nov 23, 2018Updated 7 years ago