isec-tugraz / SLUBStickLinks
☆104Updated last year
Alternatives and similar repositories for SLUBStick
Users that are interested in SLUBStick are comparing it to the libraries listed below
Sorting:
- A WIP cheat sheet for various linux kernel heap exploitation techniques (and privilige escalations).☆101Updated 3 weeks ago
- Linux kernel privilege escalation techniques☆152Updated last year
- ☆189Updated last year
- A tool for automating setup of kernel pwn challenges☆62Updated 3 months ago
- RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections☆69Updated 2 months ago
- ☆103Updated last month
- a new class of file structure attacks☆58Updated 3 years ago
- ☆187Updated 2 years ago
- CTF pwn problem writeup☆40Updated 2 years ago
- Simple script to find kernel objects of a certain size in the Linux kernel☆112Updated 3 years ago
- VirtFuzz is a Linux Kernel Fuzzer that uses VirtIO to provide inputs into the kernels subsystem. It is built with LibAFL.☆132Updated last year
- Linux & Android Kernel Vulnerability research and exploitation☆60Updated 2 years ago
- Page-Oriented Programming (POP) Tools for Black Hat USA 2023 and USENIX security 2024☆59Updated last year
- Old and new CTFs about Linux kernel exploitation.☆64Updated 3 years ago
- ☆171Updated last year
- Binary exploitation by confusing the unwinder☆68Updated 2 years ago
- Damn Vulenerable Kernel Module for kernel fuzzing☆69Updated last year
- Same-Architecture Firmware Rehosting and Fuzzing☆129Updated last year
- various docs (that are interesting, or not, depending on the point of view...)☆134Updated 2 years ago
- Linux Kernel Fuzzer Corpus☆155Updated this week
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆85Updated 7 months ago
- ☆130Updated last year
- ☆270Updated 6 months ago
- Binary Exploitation Skill. Gain RCE from arbitrary write.☆242Updated last year
- ☆75Updated last year
- ☆113Updated last year
- Easily debug processes running in docker containers☆29Updated last year
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆126Updated 2 months ago
- Explore a live Linux kernel's memory using GDB☆117Updated 3 years ago
- ASLR bypass without infoleak☆167Updated 4 years ago