hacktivesec / beginner-kernel-exploitation-setupLinks
☆16Updated 11 months ago
Alternatives and similar repositories for beginner-kernel-exploitation-setup
Users that are interested in beginner-kernel-exploitation-setup are comparing it to the libraries listed below
Sorting:
- Ansible build for Afl++ Frida-Mode☆25Updated last year
- C and Python training from our Vulnerability Researcher Development Program (VRDP)☆79Updated 2 months ago
- ☆59Updated last year
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆61Updated 2 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 2 months ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆45Updated last year
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆97Updated last year
- ☆47Updated 2 months ago
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- Personal collection of exploits and PoCs across Windows, Linux, and enterprise software.☆51Updated 2 months ago
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 7 months ago
- ☆22Updated last month
- Scanner for CVE-2024-4040☆47Updated last year
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆47Updated 6 months ago
- SpiralBL0CK / Remote-buffer-overflow-over-wifi_stack-in-wpa_supplicant-binary-in-android-11-platform-samsung-a20eRemote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Updated last year
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated last year
- Detect code obfuscation through text classification in the detection process.☆44Updated last year
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆52Updated last year
- BlackHat Asia 2025 code and presentations☆18Updated 5 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- An automatic Blind ROP exploitation tool☆204Updated 2 years ago
- A download of code without integrity check vulnerability in the "execute restore src-vis" command of FortiOS before 7.0.3.☆21Updated last year
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Updated last year
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- V8sandbox_bypass using stack misalignment☆23Updated last year
- ☆19Updated last month
- This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.☆54Updated last year
- Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)☆63Updated 4 months ago
- CVE-2024-30090 - LPE PoC☆108Updated 11 months ago