kiks7 / KRWXLinks
Kernel Read Write Execute
☆86Updated last year
Alternatives and similar repositories for KRWX
Users that are interested in KRWX are comparing it to the libraries listed below
Sorting:
- ☆32Updated 2 years ago
- poc code for CVE-2024-38080☆29Updated last year
- Here I store my proof of concepts☆14Updated last year
- A simple but useful project maybe help you reverse Windows.☆39Updated last year
- Static binary instrumentation for windows kernel drivers, to use with winafl☆76Updated 7 months ago
- ELF static analysis and injection framework that parse, manipulate, patch and camouflage ELF files.☆115Updated 2 months ago
- Report and exploit of CVE-2023-36427☆90Updated last year
- javascript extension of windbg for hacker.☆15Updated 2 years ago
- ☆145Updated last year
- ☆82Updated 2 years ago
- Tools to bypass flawed SELinux policies using the init_module system call☆58Updated last year
- Linux Kernel N-day Exploit/Analysis.☆67Updated 10 months ago
- ☆60Updated last year
- ☆81Updated last year
- ☆66Updated 2 years ago
- CVE-2021-36955☆14Updated 2 years ago
- dynamic binary instrumentation, analysis, and patching framework☆94Updated last week
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆27Updated 3 months ago
- A fast execution trace symbolizer for Windows that runs on all major platforms and doesn't depend on any Microsoft libraries.☆95Updated 10 months ago
- Windows KASLR bypass using prefetch side-channel☆126Updated last year
- ☆41Updated last year
- Go fastcall analysis for ida decompiler☆42Updated 2 months ago
- Binary exploitation by confusing the unwinder☆63Updated 2 years ago
- Security research helper for CLFS drivers☆14Updated last year
- ☆33Updated 8 months ago
- ☆71Updated 2 years ago
- Analysis of the vulnerability☆51Updated last year
- This utility allows you to lock every available memory regions of an arbitrary process into its working set.☆70Updated 2 years ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆18Updated 3 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Updated 2 years ago