lrh2000 / StackRotLinks
CVE-2023-3269: Linux kernel privilege escalation vulnerability
☆490Updated 2 years ago
Alternatives and similar repositories for StackRot
Users that are interested in StackRot are comparing it to the libraries listed below
Sorting:
- Kernel exploitation technique☆581Updated 2 years ago
- CVE-2023-4911 proof of concept☆169Updated 2 years ago
- PoC for CVE-2023-4911☆388Updated 2 years ago
- ☆104Updated last year
- ☆328Updated 2 years ago
- A collection of proof-of-concept exploit scripts written by the STAR Labs team for various CVEs that they discovered or found by others.☆304Updated 5 months ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,377Updated 11 months ago
- A blazing fast™ multithreaded ROP Gadget finder. ropper / ropgadget alternative (currently x86 only)☆540Updated 7 months ago
- Red-Team LKM☆626Updated 3 weeks ago
- Local privilege escalation PoC for Linux kernel CVE-2022-1015☆204Updated 3 years ago
- ASLR bypass without infoleak☆165Updated 4 years ago
- 📡🐧 Linux kernel syscall implementation tracker☆241Updated 3 months ago
- CVE-2022-0185☆377Updated 3 years ago
- ☆215Updated last year
- Kernel Address Space Layout Derandomization (KASLD) - A collection of various techniques to infer the Linux kernel base virtual address a…☆464Updated last year
- Linux kernel CVE exploit analysis report and relative debug environment. You don't need to compile Linux kernel and configure your enviro…☆1,274Updated last year
- ☆246Updated 3 years ago
- Analyze Golang with Ghidra☆201Updated 2 months ago
- A C++ tool to unstrip Rust/Go binaries (ELF and PE)☆399Updated 11 months ago
- 🤩 Emoji shellcoding tools for RISC-V (32-bit and 64-bit)☆176Updated 5 months ago
- ☆310Updated 2 years ago
- A plugin to introduce interactive symbols into your debugger from your decompiler☆766Updated last week
- Code Coverage Exploration Plugin for Ghidra☆372Updated last year
- ☆470Updated 2 months ago
- helps visualize heap operations for pwn and debugging☆329Updated 2 years ago
- An nsjail Docker image for CTF pwnables. Easily create secure, isolated xinetd/inetd-style services.☆249Updated last year
- exploit for CVE-2022-2588☆484Updated 2 years ago
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆877Updated 9 months ago
- CVE-2022-0995 exploit☆499Updated 3 years ago
- ☆318Updated 2 years ago