maxking / linux-vulnerabilities-10-yearsLinks
My MS thesis on survey of a decade fo Linux Kernel CVEs, their categories and various mitigations that exist.
☆159Updated 7 years ago
Alternatives and similar repositories for linux-vulnerabilities-10-years
Users that are interested in linux-vulnerabilities-10-years are comparing it to the libraries listed below
Sorting:
- Exploitation on ARM-based Systems (Troopers18)☆150Updated 7 years ago
- SPRITZ plays CTFs! Writeups by spritzers☆63Updated 7 years ago
- Function redirection via ELF tricks.☆161Updated 10 years ago
- Routines for hunting down kernel symbols.☆83Updated 14 years ago
- Disabling kernel lockdown on Ubuntu without physical access☆81Updated 2 years ago
- ☆23Updated 6 years ago
- A distributed fuzzer which aims to pull in the best technologies, make them play nicely together, and run on multiple O/Ses.☆194Updated 5 years ago
- A fuzzing introspection tool☆167Updated 5 years ago
- HeapHopper is a bounded model checking framework for Heap-implementations☆222Updated 5 months ago
- A pip wrapper around AFL.☆86Updated 4 years ago
- LKRG bypass methods☆73Updated 5 years ago
- VirtualBox 3D exploits & PoCs☆161Updated 6 years ago
- AFL + DynamoRIO = fuzzing binaries with no source code on Linux☆248Updated 6 years ago
- GlibC Malloc for Exploiters presentation☆151Updated 6 years ago
- ☆91Updated 9 years ago
- out-of-tree kernel {module, exploit} development tool☆230Updated last year
- Attacking the Core associated source files☆88Updated 8 years ago
- Boring tool to launch multiple afl-fuzz instances☆52Updated 8 years ago
- PoC for breaking hypervisor ASLR using branch target buffer collisions☆166Updated 9 years ago
- Writing PoC for fun and educate people take security seriously;-)☆142Updated 6 years ago
- Some kernel exploits☆145Updated 8 years ago
- Helper scripts for hosting a Linux kernel exploitation CTF challenge☆94Updated 10 years ago
- ☆49Updated 7 years ago
- Clang instrumentation module for tracing variable and buffer comparisons in C/C++ and saving the coverage data to .sancov files☆202Updated 6 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆72Updated 8 years ago
- ☆92Updated 7 years ago
- ☆64Updated 6 years ago
- A description of the "House of Corrosion" GLIBC heap exploitation technique.☆224Updated 5 years ago
- This repo holds materials for our Splash 2017 class on Z3.☆26Updated 8 years ago
- An interactive memory info for pwning / exploiting☆99Updated 2 years ago