Kernel Read Write Execute
☆46Jan 13, 2025Updated last year
Alternatives and similar repositories for KRWX
Users that are interested in KRWX are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆22Jul 8, 2022Updated 3 years ago
- Some V8 n-day exploits that I've written☆54Mar 1, 2026Updated last month
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆107Jan 13, 2026Updated 2 months ago
- ☆70Jul 6, 2023Updated 2 years ago
- ☆190Feb 8, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- ☆73Feb 28, 2024Updated 2 years ago
- ☆329Jun 20, 2024Updated last year
- Integer overflow in FreeType software, which also affects Chrome☆30Aug 27, 2025Updated 7 months ago
- ☆40Jul 25, 2025Updated 8 months ago
- ☆12Dec 16, 2022Updated 3 years ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Dec 11, 2022Updated 3 years ago
- ☆12Aug 3, 2025Updated 8 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 6 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- ☆11May 17, 2024Updated last year
- GDB plug-in that helps exploiting the Linux kernel's SLUB allocator☆99Mar 29, 2023Updated 3 years ago
- Research developed by Allele Security Intelligence.☆17Jul 21, 2025Updated 8 months ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- Kernel Read Write Execute☆83Aug 30, 2024Updated last year
- A utility that can be used to launch an executable with a DLL injected☆19Nov 20, 2023Updated 2 years ago
- kernel exploit POC for vulnerability i found in amd gpu driver☆11Jan 6, 2023Updated 3 years ago
- A collection of in-depth studies authored by me on JavaScript engine vulnerabilities.☆49Feb 6, 2026Updated 2 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- IDA Type Info Libraries for RE☆32Jan 11, 2025Updated last year
- Right click -> "Open with IDA"☆27Jan 20, 2024Updated 2 years ago
- An unofficial GUI wrapper around pwndbg intended to leverage the UI benefits of a graphical user interface☆23Jul 11, 2023Updated 2 years ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆41May 22, 2024Updated last year
- A tool combining DWARF info and source to search for kernel heap objects☆25Dec 23, 2025Updated 3 months ago
- ☆14Jul 1, 2025Updated 9 months ago
- ☆128Nov 12, 2024Updated last year
- ☆30Nov 25, 2025Updated 4 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Escape macOS Sandbox using sharedfilelistd exploit☆64Jun 28, 2025Updated 9 months ago
- CVE-2025-38001: Linux HFSC Eltree Use-After-Free - Debian 12 PoC☆92Jul 11, 2025Updated 9 months ago
- ☆24Jan 27, 2026Updated 2 months ago
- ☆38Apr 7, 2023Updated 3 years ago
- Tools to bypass flawed SELinux policies using the init_module system call☆59Nov 20, 2023Updated 2 years ago
- ☆21Apr 6, 2025Updated last year
- ☆31May 16, 2024Updated last year