hacktivesec / beginner-kernel-exploitation-setupLinks
☆16Updated last year
Alternatives and similar repositories for beginner-kernel-exploitation-setup
Users that are interested in beginner-kernel-exploitation-setup are comparing it to the libraries listed below
Sorting:
- Ansible build for Afl++ Frida-Mode☆25Updated last year
- ☆63Updated last year
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆45Updated last year
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆80Updated 2 months ago
- Scanner for CVE-2024-4040☆49Updated last year
- ☆38Updated 10 months ago
- BlackHat Asia 2025 code and presentations☆18Updated 6 months ago
- ☆48Updated 3 months ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated last year
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆97Updated last year
- PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Iv…☆47Updated 9 months ago
- Personal collection of exploits and PoCs across Windows, Linux, and enterprise software.☆54Updated 3 months ago
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆48Updated 6 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Updated 2 months ago
- ☆22Updated last month
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆61Updated 2 years ago
- An automatic Blind ROP exploitation tool☆205Updated 2 years ago
- xortigate-cve-2023-27997☆63Updated 2 years ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year
- Lorex 2K Indoor Wi-Fi Security Camera: RCE Exploit Chain☆14Updated 10 months ago
- Leveraging patch diffing to discover new vulnerabilities☆136Updated last year
- Keycloak admin API allows low privilege users to use administrative functions☆27Updated last year
- This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.☆55Updated last year
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆52Updated last year
- BINARLY Research Tools and PoCs☆38Updated last year
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Updated 2 years ago
- Detect code obfuscation through text classification in the detection process.☆44Updated last year
- LLM-based automated patch diffing☆81Updated last month