hacktivesec / beginner-kernel-exploitation-setupLinks
☆16Updated 8 months ago
Alternatives and similar repositories for beginner-kernel-exploitation-setup
Users that are interested in beginner-kernel-exploitation-setup are comparing it to the libraries listed below
Sorting:
- Ansible build for Afl++ Frida-Mode☆24Updated last year
- This repository contains the pre-joining training materials given to aspiring researchers on the Vulnerability Researcher Development Pro…☆76Updated last month
- ☆59Updated last year
- A simple mutator engine which focuses on finding unknown classes of injection vulnerabilities☆67Updated last year
- vulnlab.com reaper writeup☆26Updated last year
- ☆36Updated 7 months ago
- Personal collection of exploits and PoCs across Windows, Linux, and enterprise software.☆50Updated 3 months ago
- ysoserial.net docker image☆28Updated 9 months ago
- PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Iv…☆45Updated 6 months ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated last year
- Exploit for CVE-2024-5009☆13Updated last year
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆96Updated 9 months ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆45Updated last year
- Userland exec PoC to be used as attack vector technique☆85Updated 5 months ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆60Updated last year
- ☆33Updated 4 months ago
- Keycloak admin API allows low privilege users to use administrative functions☆27Updated 9 months ago
- The OWApp Benchmark: an OWASP-compliant Vulnerable Android App Dataset☆44Updated 3 months ago
- In this Arsenal lab session, we will extract firmware from an EV charger, dig into the firmware, and eventually emulate it so we can inte…☆52Updated last year
- My journey and notes on learning Offensive Security from the ground up☆19Updated last year
- ☆34Updated 10 months ago
- Java archive implant toolkit.☆61Updated 2 months ago
- Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)☆59Updated last month
- xortigate-cve-2023-27997☆64Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated last year
- Scanner for CVE-2024-4040☆47Updated last year
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆47Updated 6 months ago
- ☆23Updated 5 months ago
- Proof of Concept Exploit for CVE-2024-9464☆45Updated 9 months ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago