maxking / linux-vulnerabilities-10-yearsLinks
My MS thesis on survey of a decade fo Linux Kernel CVEs, their categories and various mitigations that exist.
☆159Updated 7 years ago
Alternatives and similar repositories for linux-vulnerabilities-10-years
Users that are interested in linux-vulnerabilities-10-years are comparing it to the libraries listed below
Sorting:
- Exploitation on ARM-based Systems (Troopers18)☆150Updated 7 years ago
- ASLREKT is a proof of concept for an unfixed generic local ASLR bypass in Linux.☆26Updated 5 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆81Updated 3 years ago
- A fuzzing framework for network servers☆120Updated 7 years ago
- ☆52Updated 4 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆222Updated 6 months ago
- ☆49Updated 7 years ago
- A distributed fuzzer which aims to pull in the best technologies, make them play nicely together, and run on multiple O/Ses.☆194Updated 5 years ago
- Materials from Fuzzing Bay Area meetups☆68Updated 6 years ago
- SPRITZ plays CTFs! Writeups by spritzers☆63Updated 8 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆167Updated 9 years ago
- Fuzz testing: Beginner's guide☆76Updated last year
- GlibC Malloc for Exploiters presentation☆151Updated 6 years ago
- Routines for hunting down kernel symbols.☆83Updated 14 years ago
- Function redirection via ELF tricks.☆162Updated 10 years ago
- LKRG bypass methods☆73Updated 5 years ago
- A tool for checking exploitability☆210Updated 6 years ago
- ☆92Updated 8 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 6 years ago
- ☆91Updated 9 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆224Updated 5 years ago
- A fuzzing introspection tool☆167Updated 5 years ago
- Code samples used for the blog post☆24Updated 8 years ago
- Bug hunting through fuzzer/*-sanitizer/etc...☆133Updated 5 years ago
- Attacking the Core associated source files☆89Updated 8 years ago
- Documentation and Quick Start Guides for the S2E Symbolic Execution Platform☆76Updated 6 years ago
- ☆64Updated 6 years ago
- ☆23Updated 6 years ago
- out-of-tree kernel {module, exploit} development tool☆230Updated last year
- GDB + GEF cheatsheet for reversing binaries☆74Updated 2 years ago