☆106Aug 9, 2024Updated last year
Alternatives and similar repositories for SLUBStick
Users that are interested in SLUBStick are comparing it to the libraries listed below
Sorting:
- Assets used in lecture "手を動かして理解するLinux Kernel Exploit" at SecurityCamp2023.☆17Sep 13, 2023Updated 2 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91May 12, 2022Updated 3 years ago
- ☆127Nov 12, 2024Updated last year
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆69Nov 13, 2025Updated 3 months ago
- Linux kernel privilege escalation techniques☆152Aug 9, 2024Updated last year
- ☆16Aug 19, 2024Updated last year
- GEF - GDB Enhanced Features - bata24's fork☆622Updated this week
- Slides of mine.☆12Apr 19, 2024Updated last year
- Linux kernel and browser exploit scripts for ctf challenges☆15Apr 24, 2025Updated 10 months ago
- ☆189Feb 8, 2025Updated last year
- Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang☆20Aug 9, 2022Updated 3 years ago
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆106Jan 13, 2026Updated last month
- LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.☆91Nov 23, 2023Updated 2 years ago
- ☆22Aug 5, 2025Updated 6 months ago
- Research developed by Allele Security Intelligence.☆17Jul 21, 2025Updated 7 months ago
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 4 months ago
- ☆16Apr 6, 2023Updated 2 years ago
- linux kernel cross page attack demo module☆31Mar 15, 2023Updated 2 years ago
- A Symbolic Execution Engine for Dynamic Kernel Analysis☆32Jun 16, 2024Updated last year
- Slides about HyperDbg☆39Feb 11, 2026Updated 3 weeks ago
- Linux kernel exploitation experiments☆385Jan 19, 2026Updated last month
- A V8 Sandbox Escape Technique.☆21Feb 8, 2025Updated last year
- ☆27Nov 30, 2024Updated last year
- ☆25Mar 26, 2025Updated 11 months ago
- ☆228Dec 9, 2020Updated 5 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆39Nov 26, 2024Updated last year
- Proof of concept code for CVE-2023-2008☆40Jun 12, 2023Updated 2 years ago
- attachment and write up for D^3CTF 2023's pwn challenge - d3kcache☆41Jun 28, 2024Updated last year
- Everything you need to build and run Linux and Android kernels for exploit development☆101Apr 9, 2024Updated last year
- Repo for talk slides & materials☆21Nov 22, 2024Updated last year
- kernel-pwn and writeup collection☆700Oct 2, 2023Updated 2 years ago
- V8sandbox_bypass using stack misalignment☆23Aug 25, 2024Updated last year
- ☆23Jul 28, 2023Updated 2 years ago
- Kernel Read Write Execute☆46Jan 13, 2025Updated last year
- Spectre based on Linear Address Masking☆68Dec 4, 2023Updated 2 years ago
- CVE-2022-2586: Linux kernel nft_object UAF☆20Sep 3, 2022Updated 3 years ago
- ☆172Jan 5, 2025Updated last year
- A REALLY Danger Windows Driver, Turn Any threads Ring0!☆13Aug 11, 2025Updated 6 months ago
- An exploit primitive in linux kernel inspired by DirtyPipe☆101Apr 5, 2022Updated 3 years ago