☆16Oct 18, 2024Updated last year
Alternatives and similar repositories for beginner-kernel-exploitation-setup
Users that are interested in beginner-kernel-exploitation-setup are comparing it to the libraries listed below
Sorting:
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- 4.9 Kernel Exploit for CVE-2020-27786☆10Dec 3, 2022Updated 3 years ago
- A list of resources for the talk Rowhammer Revisited: From Exploration to Exploitation and Mitigation☆15Dec 13, 2023Updated 2 years ago
- Celery plugin to autoscale based on available CPU, memory, or other system attributes.☆11Dec 8, 2017Updated 8 years ago
- Python code to Serialize and Unserialize java binary serialization format.☆29Feb 27, 2026Updated 3 weeks ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- Extract domain from SSL Information☆15Nov 23, 2021Updated 4 years ago
- ☆10Jul 25, 2024Updated last year
- ☆23Mar 17, 2024Updated 2 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- ELISA: Exit-Less, Isolated, and Shared Access for Virtual Machines☆21Nov 1, 2025Updated 4 months ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆55Dec 8, 2023Updated 2 years ago
- Progress of learning kernel development☆14Nov 20, 2022Updated 3 years ago
- Virtual machine introspection library based on libvmi - parts of this work have been funded by Deutsche Forschungsgemeinschaft (DFG) – pr…☆31Mar 3, 2022Updated 4 years ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated last year
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Dec 13, 2023Updated 2 years ago
- Resources Links for the Research Based on Josh Prager and Nico Shyne's☆13Oct 21, 2024Updated last year
- ROP-Gadget finder in Rust☆17Feb 2, 2018Updated 8 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- ☆17Jan 20, 2026Updated 2 months ago
- A code skeleton of Samsung's Shannon5123 5G baseband modem.☆20May 6, 2020Updated 5 years ago
- Office 365 and Exchange Enumeration Version 2☆18Jan 30, 2024Updated 2 years ago
- OG Atomic Red Team☆30Jun 12, 2018Updated 7 years ago
- 000☆16Mar 30, 2022Updated 3 years ago
- Tomcat Jar包后门☆20May 21, 2022Updated 3 years ago
- One line command and control backdoors for APIs and web applications.☆51Apr 9, 2024Updated last year
- Virtual Machine Introspection (VMI) for memory forensics and machine-learning.☆28Jun 2, 2025Updated 9 months ago
- CVE-2024-25641 - RCE Automated Exploit - Cacti 1.2.26☆10Aug 28, 2024Updated last year
- 容器安全漏洞的分析与复现☆160Mar 26, 2024Updated last year
- PassBreaker☆66Apr 5, 2024Updated last year
- ☆18Mar 26, 2024Updated last year
- Standalone android/platform/frameworks/native/libs/binder☆36Sep 24, 2023Updated 2 years ago
- OmniCrawl is a web measurement tool that allows for recording of web requests and JavaScript browser API accesses on multiple platforms.☆28Mar 20, 2024Updated 2 years ago
- Quick network scanner library. https://crates.io/crates/qscan☆92Dec 26, 2022Updated 3 years ago
- Solutions to some exercises in the book Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation 1s…☆14Sep 22, 2023Updated 2 years ago
- ☆18Sep 22, 2024Updated last year
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- ☆13Apr 15, 2024Updated last year