jollheef / lpe
collection of verified Linux kernel exploits
☆185Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for lpe
- A thorough library database to assist with binary exploitation tasks.☆196Updated 2 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆214Updated 6 years ago
- out-of-tree kernel {module, exploit} development tool☆221Updated last month
- Exploit for CVE-2019-9810 Firefox on Windows 64-bit.☆227Updated 4 years ago
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆413Updated 2 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆390Updated 5 years ago
- A tool for checking exploitability☆210Updated 5 years ago
- 35C3 Junior CTF pwnables☆148Updated 5 years ago
- ☆235Updated 5 years ago
- ☆92Updated 6 years ago
- Exploiting challenges in Linux and Windows☆121Updated 4 years ago
- A simple embedded Linux backdoor.☆194Updated 4 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆297Updated last year
- Linux kernel XFRM UAF poc (3.x - 5.x kernels)☆132Updated 4 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆220Updated 4 years ago
- ☆52Updated 5 years ago
- linux rootkit☆156Updated 6 years ago
- ☆191Updated 7 years ago
- SSD Secure Disclosure Advisories☆167Updated 4 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆288Updated 5 years ago
- Public work for CVE-2019-0708☆289Updated 5 years ago
- Python automation of Docker.sock abuse☆210Updated last year
- X41 Browser Security White Paper - Tools and PoCs☆184Updated 7 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆49Updated 2 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆95Updated 4 years ago
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆179Updated 7 years ago
- Vulnerability examples.☆399Updated 6 months ago