kiks7 / KRWXView external linksLinks
Kernel Read Write Execute
☆84Aug 30, 2024Updated last year
Alternatives and similar repositories for KRWX
Users that are interested in KRWX are comparing it to the libraries listed below
Sorting:
- 4.9 Kernel Exploit for CVE-2020-27786☆10Dec 3, 2022Updated 3 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- Exploit for CVE-2022-29582 targeting Google's Kernel CTF☆77Aug 8, 2022Updated 3 years ago
- ☆86Jan 9, 2023Updated 3 years ago
- the Open Source and Pure C++ Packer for eXecutables☆21Mar 25, 2023Updated 2 years ago
- ☆189Feb 8, 2025Updated last year
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- ☆17Apr 18, 2023Updated 2 years ago
- ☆216Mar 29, 2024Updated last year
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Jan 21, 2023Updated 3 years ago
- LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.☆92Nov 23, 2023Updated 2 years ago
- IDA Pro Python plugin to analyze and annotate Linux kernel alternatives☆24Dec 15, 2021Updated 4 years ago
- ☆73Feb 28, 2024Updated last year
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Nov 4, 2022Updated 3 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- ☆16Apr 21, 2023Updated 2 years ago
- it's a driver injector or driver loader header lib(Windows)☆12Aug 5, 2023Updated 2 years ago
- ☆177Jun 18, 2023Updated 2 years ago
- Abusing exceptions for code execution.☆113Jan 30, 2023Updated 3 years ago
- Enumerate various traits from Windows processes as an aid to threat hunting☆202Jan 13, 2022Updated 4 years ago
- Post exploitation technique to turn arbitrary kernel write / increment into full read/write primitive on Windows 11 22H2☆247Jul 5, 2022Updated 3 years ago
- Dont Call Me Back - Dynamic kernel callback resolver. Scan kernel callbacks in your system in a matter of seconds!☆246Jul 9, 2024Updated last year
- Binary exploitation by confusing the unwinder☆68Mar 9, 2023Updated 2 years ago
- Simple script to find kernel objects of a certain size in the Linux kernel☆112Dec 1, 2022Updated 3 years ago
- ☆16Oct 31, 2021Updated 4 years ago
- PoC for House of Husk Exploit☆13Apr 3, 2020Updated 5 years ago
- Exploits for CVE-2023-27327 and CVE-2023-27328☆14May 9, 2023Updated 2 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- Simple BOF to read the protection level of a process☆118May 10, 2023Updated 2 years ago
- Official Solution and Source Code for the "Mock Kernel" challenge from UIUCTF 2023☆49Jul 11, 2023Updated 2 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 2 years ago
- GDB plug-in that helps exploiting the Linux kernel's SLUB allocator☆96Mar 29, 2023Updated 2 years ago
- Playing for {K (H) eaps}: Understanding and Improving Linux Kernel Exploit Reliability☆91May 12, 2022Updated 3 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Sep 16, 2022Updated 3 years ago
- ☆13Dec 29, 2022Updated 3 years ago
- ☆70Jul 6, 2023Updated 2 years ago
- PoC Implementation of a fully dynamic call stack spoofer☆901Jul 20, 2024Updated last year
- A repository with my code snippets for research/education purposes.☆52Jul 28, 2023Updated 2 years ago
- Exploit app for CVE-2022-20494, a high severity permanent denial-of-service vulnerability that leverages Android's DND (Do not disturb) f…☆26Mar 3, 2023Updated 2 years ago