lrh2000 / StackRotLinks
CVE-2023-3269: Linux kernel privilege escalation vulnerability
☆484Updated 2 years ago
Alternatives and similar repositories for StackRot
Users that are interested in StackRot are comparing it to the libraries listed below
Sorting:
- Kernel exploitation technique☆577Updated last year
- PoC for CVE-2023-4911☆388Updated last year
- ☆326Updated 2 years ago
- CVE-2023-4911 proof of concept☆168Updated last year
- Red-Team Linux kernel rootkit☆550Updated 2 weeks ago
- A blazing fast™ multithreaded ROP Gadget finder. ropper / ropgadget alternative (currently x86 only)☆526Updated 3 months ago
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,251Updated last year
- ASLR bypass without infoleak☆160Updated 3 years ago
- A collection of proof-of-concept exploit scripts written by the STAR Labs team for various CVEs that they discovered or found by others.☆286Updated 2 months ago
- ☆104Updated last year
- Local privilege escalation PoC for Linux kernel CVE-2022-1015☆202Updated 3 years ago
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆453Updated last year
- Exploit for 6.4 - 6.5 kernels and another exploit for 5.15 - 6.5☆844Updated last year
- Analyze Golang with Ghidra☆179Updated last month
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆225Updated last year
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆176Updated last month
- 📡🐧 Linux kernel syscall implementation tracker☆223Updated 5 months ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,365Updated 7 months ago
- A plugin to introduce interactive symbols into your debugger from your decompiler☆697Updated 5 months ago
- exploit for CVE-2022-2588☆486Updated 2 years ago
- ☆309Updated 2 years ago
- ☆243Updated 3 years ago
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆862Updated 5 months ago
- kernel-pwn and writeup collection☆649Updated last year
- Source code for the DEF CON 30 CTF Qualifiers.☆264Updated last year
- Python Command-Line Ghidra Binary Diffing Engine☆674Updated last month
- CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation☆576Updated 3 years ago
- A C++ tool to unstrip Rust/Go binaries (ELF and PE)☆393Updated 7 months ago
- ☆216Updated last year
- PAWNYABLE!☆217Updated last year