Kernel Read Write Execute
☆46Jan 13, 2025Updated last year
Alternatives and similar repositories for KRWX
Users that are interested in KRWX are comparing it to the libraries listed below
Sorting:
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- ☆22Jul 8, 2022Updated 3 years ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆106Jan 13, 2026Updated last month
- ☆70Jul 6, 2023Updated 2 years ago
- Integer overflow in FreeType software, which also affects Chrome☆28Aug 27, 2025Updated 6 months ago
- Research developed by Allele Security Intelligence.☆17Jul 21, 2025Updated 7 months ago
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- ☆189Feb 8, 2025Updated last year
- ☆39Jul 25, 2025Updated 7 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆17Sep 26, 2025Updated 5 months ago
- A utility that can be used to launch an executable with a DLL injected☆19Nov 20, 2023Updated 2 years ago
- ☆73Feb 28, 2024Updated 2 years ago
- ☆35Nov 16, 2023Updated 2 years ago
- ☆330Jun 20, 2024Updated last year
- A tool combining DWARF info and source to search for kernel heap objects☆24Dec 23, 2025Updated 2 months ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆23Dec 11, 2022Updated 3 years ago
- ☆21Apr 6, 2025Updated 10 months ago
- ☆127Nov 12, 2024Updated last year
- Full chain Chrome 71.0.3578.98 exploit☆22Jul 18, 2021Updated 4 years ago
- Tool for profiling heap usage and memory management☆27Oct 31, 2021Updated 4 years ago
- ☆12Dec 16, 2022Updated 3 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- ☆30Nov 25, 2025Updated 3 months ago
- Code Coverage client for DynamoRIO☆12Jan 20, 2019Updated 7 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- ☆14Jul 1, 2025Updated 8 months ago
- kernel exploit POC for vulnerability i found in amd gpu driver☆11Jan 6, 2023Updated 3 years ago
- ☆12Aug 22, 2022Updated 3 years ago
- This is a ctf challenge for qemu escape, it's basic and normal, but there is a thinking trap in it, you may need some time to find out th…☆10Mar 28, 2024Updated last year
- Linux kernel and browser exploit scripts for ctf challenges☆15Apr 24, 2025Updated 10 months ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Sep 30, 2020Updated 5 years ago
- ☆11May 17, 2024Updated last year
- Official Solution and Source Code for the "Mock Kernel" challenge from UIUCTF 2023☆49Jul 11, 2023Updated 2 years ago
- Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.☆106Feb 12, 2025Updated last year
- CVE-2025-38001: Linux HFSC Eltree Use-After-Free - Debian 12 PoC☆93Jul 11, 2025Updated 7 months ago
- Right click -> "Open with IDA"☆27Jan 20, 2024Updated 2 years ago