Hacks and experiments for the linux kernel VM subsystem.
☆23Jun 4, 2022Updated 3 years ago
Alternatives and similar repositories for linux-vm-hacks
Users that are interested in linux-vm-hacks are comparing it to the libraries listed below
Sorting:
- Notes on the linux kernel VM subsystem.☆383Dec 3, 2022Updated 3 years ago
- Notes taken from Understanding the Linux Virtual Memory Manager by Mel Gorman targeting kernel 2.4.22.☆66Jun 30, 2016Updated 9 years ago
- The Linux Scheduler Simulator☆12Dec 20, 2010Updated 15 years ago
- Exploitation techniques to bypass Clang CFI when applied to Chromium☆114Mar 5, 2018Updated 8 years ago
- ☆11Jan 6, 2020Updated 6 years ago
- ☆13Apr 9, 2022Updated 3 years ago
- set of small and useful kernel modules/patches for tracing/debugging of different stuff and for learning of Linux kernel☆33Dec 25, 2017Updated 8 years ago
- A network interface for GDB for Linux Kernel☆74Aug 3, 2025Updated 7 months ago
- AES-based random number generator in C☆11Apr 27, 2015Updated 10 years ago
- Get build time statistics of _FORTIFY_SOURCE coverage for programs☆12Sep 23, 2024Updated last year
- Intra-Unikernel Isolation with Intel Memory Protection Keys☆13Mar 18, 2020Updated 6 years ago
- Examples for: Learning KVM - implement your own kernel☆379Sep 3, 2023Updated 2 years ago
- Benchmark to test different stop the exploit mitigations☆18Jan 8, 2019Updated 7 years ago
- The conference that comes together while you sleep.☆17Feb 12, 2021Updated 5 years ago
- An example LLVM pass which can run automatically in clang.☆38Aug 4, 2015Updated 10 years ago
- Open-source release for MemSentry (EuroSys'17)☆47May 5, 2021Updated 4 years ago
- Securing Embedded Systems with Return Address Integrity☆15Aug 19, 2024Updated last year
- the rounding error tool 🚩☆14May 16, 2025Updated 10 months ago
- kR^X: Comprehensive Kernel Protection Against Just-In-Time Code Reuse☆13Aug 21, 2017Updated 8 years ago
- ☆13Oct 17, 2021Updated 4 years ago
- ☆26Jun 3, 2016Updated 9 years ago
- Repository containing all UEFI development I am doing☆13Aug 6, 2016Updated 9 years ago
- Hide the memory of the process in the Linux kernel.☆10Dec 8, 2020Updated 5 years ago
- Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques (Usenix '19)☆15Aug 16, 2019Updated 6 years ago
- Linux Kernel in a Nutshell☆33Apr 24, 2015Updated 10 years ago
- Exploit code by DirtyChain☆14Apr 11, 2025Updated 11 months ago
- An embedded operating system kernel☆15Jul 2, 2017Updated 8 years ago
- Virtio in userspace☆12Nov 8, 2011Updated 14 years ago
- Windows PE file debugger☆11Aug 30, 2017Updated 8 years ago
- Attacking the Core associated source files☆89Dec 13, 2017Updated 8 years ago
- Full functional idascript with stdin/stdout handled☆20Jan 25, 2017Updated 9 years ago
- Fork of http://code.nsnam.org/thehajime/elf-loader/ for unlimited dlmopen namespaces☆21Oct 11, 2023Updated 2 years ago
- Analysing chess.com games at lichess.org for free.☆22Jan 2, 2026Updated 2 months ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 6 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- An exokernel for the raspberry pi 3.☆82Nov 17, 2021Updated 4 years ago
- ☆20Mar 10, 2022Updated 4 years ago
- Notes, exploits, and other stuff that I create while learning Linux Kernel exploitation techniques☆96Mar 21, 2023Updated 3 years ago
- RISC-V emulator for high-performance fuzzing with AOT instead of JIT compilation 🦑☆23Jun 20, 2025Updated 9 months ago