hardenedlinux / userland-execLinks
Userland exec PoC to be used as attack vector technique
☆85Updated 6 months ago
Alternatives and similar repositories for userland-exec
Users that are interested in userland-exec are comparing it to the libraries listed below
Sorting:
- Golem automates C/C++ vulnerability discovery with SemGrep+LLVM+LLM☆91Updated 2 months ago
- eBPF Memory Dump Tool☆82Updated 2 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆42Updated last year
- Open Source eBPF Malware Analysis Framework☆49Updated 10 months ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 2 weeks ago
- Cheat sheet to detect and remove linux kernel rootkit☆68Updated 8 months ago
- This repository contains the pre-joining training materials given to aspiring researchers on the Vulnerability Researcher Development Pro…☆79Updated 3 weeks ago
- Aplos an extremely simple fuzzer for Windows binaries.☆69Updated 6 months ago
- A simple Meterpreter stager written in Rust.☆40Updated 11 months ago
- CVE-2024-30090 - LPE PoC☆107Updated 10 months ago
- Rust Linux Kernel Module designed for LKM rootkit detection☆51Updated 5 months ago
- GERMY is a Linux Kernel n-day in the N_GSM line discipline☆49Updated last year
- Proof-of-concept modular implant platform leveraging v8☆54Updated 5 months ago
- ☆23Updated 6 months ago
- Binary Exploitation Phrack CTF Challenge☆85Updated this week
- ☆49Updated 4 months ago
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆120Updated 2 months ago
- ☆59Updated last year
- WallEscape vulnerability in util-linux☆51Updated last year
- ☆64Updated last year
- ☆105Updated last year
- BINARLY Research Tools and PoCs☆36Updated 10 months ago
- eBPF hacks☆187Updated 8 months ago
- A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue☆99Updated last year
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated 7 months ago
- ☆19Updated this week
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆98Updated 10 months ago
- ☆37Updated 8 months ago
- call gates as stable comunication channel for NT x86 and Linux x86_64☆32Updated 2 years ago
- ☆71Updated 9 months ago