jollheef / lpe
collection of verified Linux kernel exploits
☆187Updated 4 years ago
Alternatives and similar repositories for lpe:
Users that are interested in lpe are comparing it to the libraries listed below
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆300Updated 2 years ago
- out-of-tree kernel {module, exploit} development tool☆224Updated 4 months ago
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆418Updated 3 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆214Updated 7 years ago
- TLS Redirection☆120Updated 7 years ago
- ☆234Updated 6 years ago
- A thorough library database to assist with binary exploitation tasks.☆197Updated 2 years ago
- List of real-world threats against endpoint protection software☆215Updated 4 months ago
- A tool for checking exploitability☆209Updated 5 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆323Updated 3 years ago
- Vulnerability examples.☆404Updated 11 months ago
- ☆122Updated 7 years ago
- Cross Architecture Shellcode in C☆200Updated 8 years ago
- Linux kernel XFRM UAF poc (3.x - 5.x kernels)☆133Updated 5 years ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- My MS thesis on survey of a decade fo Linux Kernel CVEs, their categories and various mitigations that exist.☆157Updated 6 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆289Updated 5 years ago
- A simple embedded Linux backdoor.☆197Updated 4 years ago
- linux rootkit☆159Updated 7 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Checksec tool in Python, Rich output. Based on LIEF☆330Updated last month
- ☆192Updated 7 years ago
- Exploiting challenges in Linux and Windows☆122Updated 5 years ago
- Radare 2 wiki☆92Updated 4 years ago
- ☆92Updated 7 years ago
- Exploit for CVE-2019-9810 Firefox on Windows 64-bit.☆229Updated 5 years ago
- Local UNIX PrivEsc Aggregation☆246Updated 9 years ago
- GUI tool to create ROP chains using the ropper API☆156Updated 7 years ago
- A fuzzing framework for network servers☆118Updated 6 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago