gsingh93 / linux-exploit-dev-envLinks
Everything you need to build and run Linux and Android kernels for exploit development
☆92Updated last year
Alternatives and similar repositories for linux-exploit-dev-env
Users that are interested in linux-exploit-dev-env are comparing it to the libraries listed below
Sorting:
- ☆48Updated last year
- Exynos Modem / Shannon baseband firmware loader for IDA Pro 8.x/9.x☆73Updated 6 months ago
- ☆120Updated 2 years ago
- Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215☆66Updated 2 years ago
- ☆45Updated 8 months ago
- A fuzzing framework for Hexagon baseband firmware using QEMU system emulation.☆94Updated 2 weeks ago
- AFL bindings for Unicorn-Engine☆81Updated 2 weeks ago
- GDB plug-in that helps exploiting the Linux kernel's SLUB allocator☆90Updated 2 years ago
- A patched QEMU that exposes an interface for LibAFL-based fuzzers☆77Updated 2 months ago
- Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emula…☆124Updated last year
- Linux & Android Kernel Vulnerability research and exploitation☆47Updated last year
- USB device fuzzing on Android Phone☆31Updated 3 years ago
- A collection of PoCs for advanced Linux kernel exploits.☆57Updated 2 months ago
- Research related☆89Updated 3 years ago
- IDA Pro Docker Image☆95Updated last year
- Files related to the Pwn2Own Toronto 2023 exploit against the Xiaomi 13 Pro.☆26Updated 9 months ago
- PoC of fuzzing closed-source userspace binaries with KVM☆165Updated last year
- ☆58Updated 4 years ago
- ☆60Updated 6 months ago
- A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)☆123Updated 3 years ago
- ☆90Updated 2 years ago
- Code snippets for Binary Ninja's Python API☆28Updated 4 years ago
- Code of KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting Mitigations (USENIX Security'23)☆80Updated last year
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆60Updated last year
- ☆72Updated 9 months ago
- Linux kernel privilege escalation techniques☆137Updated 11 months ago
- Reverse-engineering tools and exploits for Samsung's implementation of TrustZone☆152Updated 5 years ago
- Slides from Off-By-One Conferences☆29Updated 10 months ago
- Simple script to find kernel objects of a certain size in the Linux kernel☆109Updated 2 years ago
- Old and new CTFs about Linux kernel exploitation.☆55Updated 3 years ago