jollheef / lpe
collection of verified Linux kernel exploits
☆187Updated 4 years ago
Alternatives and similar repositories for lpe:
Users that are interested in lpe are comparing it to the libraries listed below
- out-of-tree kernel {module, exploit} development tool☆226Updated 3 months ago
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆418Updated 3 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆214Updated 7 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆298Updated 2 years ago
- A tool for checking exploitability☆209Updated 5 years ago
- TLS Redirection☆120Updated 7 years ago
- elf-strings will programmatically read an ELF binary's string sections within a given binary. This is meant to be much like the strings U…☆140Updated 7 years ago
- A simple embedded Linux backdoor.☆197Updated 4 years ago
- A thorough library database to assist with binary exploitation tasks.☆197Updated 2 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- ☆191Updated 7 years ago
- 35C3 Junior CTF pwnables☆148Updated 6 years ago
- linux rootkit☆159Updated 7 years ago
- Linux kernel XFRM UAF poc (3.x - 5.x kernels)☆133Updated 5 years ago
- A fuzzing framework for network servers☆118Updated 6 years ago
- ARM shellcode and exploit development - BSidesMunich 2018☆106Updated 6 years ago
- Local UNIX PrivEsc Aggregation☆246Updated 8 years ago
- SSD Secure Disclosure Advisories☆168Updated 4 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆289Updated 5 years ago
- ☆92Updated 7 years ago
- Exploit for CVE-2019-9810 Firefox on Windows 64-bit.☆228Updated 5 years ago
- An exploit for Apache Struts CVE-2018-11776☆301Updated 6 years ago
- Encrypted exploit delivery for the masses☆267Updated 5 years ago
- Linux kernel exploitation experiments☆198Updated last week
- ☆283Updated 4 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆325Updated 3 years ago
- ☆234Updated 6 years ago
- My MS thesis on survey of a decade fo Linux Kernel CVEs, their categories and various mitigations that exist.☆155Updated 6 years ago
- Vulnerability examples.☆403Updated 10 months ago
- Some kernel exploits☆144Updated 7 years ago